text
stringlengths
1
3.78M
meta
dict
I've always done things the hard way, the different way, many times to the chagrin of my mentors. Some of my colleagues think I'm crass and that my research isn't scholarly, and some think my work is visionary and that I am forthright. If I were a crap academic (and there are plenty of us out there, tilting our own windmills), I might take the negative comments to heart, but instead I've proven over and over again why sometimes the hard way works. My C.V. represents that proof, but doesn't represent HOW I was able to move from whippersnapper M.F.A. student doing the first electronic (interactive) thesis at my university to how I became editor of the leading journal in digital writing studies, winner of my field's top innovation award, and recipient of a Fulbright. While I could trace that pattern, I'd rather tell you about the system in which such a tracing can happen, because all of the professional, rhetorical moves I've made in my career can be traced back to the kinds of playful professional-development mentorship my field is known for fostering. And one of those methods -- sparkleponies -- erupted the interwebs last week. If you don't live in my field, here's some background: Rhetoric and composition's main gathering, the Conference on College Composition and Communication (otherwise known as the Cs) was held a few weeks ago in Indianapolis. About 3,200 scholars attended. In higher ed trade publications, two articles were written about the thousands of research panels at Cs. At only a half-century old, this relatively young field is used to being ignored in the media, and outright discounted by most in academia, which is a shame since writing studies scholars research how writing works in the world, and how to teach it better. Pretty much every academic discipline and everyday people in the world would benefit from knowing more about our research, which is grounded in recognizing writing as an activity system that is collaborative, social, process-based and product-oriented. Instead, the world now thinks that writing research conferences are all about sparkleponies, since several venues of questionable journalistic repute published stories about a professionalization and mentoring game that has been run for several years at Cs called C's the Day. In brief: winners of this augmented reality game, who have completed upwards of 80 professional-development and network-building quests throughout the course of the conference, are awarded a giant sparkly pony and the chance to be mentored into their first publications in one of three scholarly journals in the field. Rather than feed into the unhappy academic trolls who populate the discussion threads on those previous articles, I want to focus on why sparkleponies represent an important method of mentoring junior scholars into an academic discipline, and why junior scholars should have a choice between mentoring that approves of sparkleponies and those that do not. Digital writing studies (as the subfield of rhetoric and composition and out of which C's the Day was born) has always valued play as a learning method. Placed within a theoretical framework of game studies, playing a game in order to learn is commonplace in this field. For two decades (or more), this field has used game-based mentoring to acculturate new scholars, specifically by having first-time attendees at its subdisciplinary conference. Computers and Writing answer historical questions about the field by partnering with luminaries in the field during its [day-long professional development workshop. Prizes, including academic books and other fun tchotchkes, are donated to support and encourage new scholars to enter (and stay) in the field. (Secret: Everyone wins a prize, because in this subdiscipline, everyone is seen as a potential winner.) First-time attendees are also partnered with a mentor-luminary throughout the conference, to further break down the barriers between so-called stars and newcomers. Finally, first-timers are given quiz sheets to have signed by other leaders in the field (e.g., Get the signatures of two journal editors; Get the signature of a past C&W host; etc.) The express purpose of these games is to break down hierarchical barriers between junior and senior scholars, to build historical knowledge of the field, and to introduce junior scholars to the field's professional development values and methods (through fun and prizes). Year after year, first-time attendees tell the conference organizers and leaders they meet how friendly, welcoming, and open this conference is, and the professionalization games are a major part of that openness. C&W is the reason I became an academic: The people were nice, genuine, and had interesting research. (If we are not happy, why do what we do?!) It is these values that the organizers of C's the Day brought from C&W, with its smaller attendance of around 400 people annually, to the much-larger, difficult to navigate, and overwhelming Cs conference. Yet, C's the Day, with its sparkleponies and guaranteed publication for winners, isn't necessarily welcome by all who attend the large conference. Why? Because there are two types of mentors at the large conference: Those who value nontraditional mentoring styles like those that have been used at C&W for decades, and those who value traditional mentoring styles. No one has been able to explain to me what these "traditional" networking paths are, but I am guessing that they equate with privilege and access to mentors at top research institutions who can introduce students to appropriate leaders, help students write their first academic article, tell students which parties to attend to meet the "right" people at conferences, and provide funding for those students to get to such conferences. (As a relevant aside, these universities are places where, for the most part, research in digital writing studies has not been welcome because of its nontraditional, technological nature. I have heretofore avoided such institutions, and my career has been fine.) These places, as I've stated in other columns, are looking for a certain kind of scholar, a scholar who has been mentored in "appropriate" ways -- that is, not through game-based play that is relevant as a practice and a research area within a discipline. These "appropriate" ways of mentoring are valued, accepted, and recognized within academic disciplines, but they are not always the best or most appropriate way to acculturate new scholars into the field. I would even argue that traditional mentoring strategies might be yet another reason why academia is so white. C's the Day was started to help junior scholars who might not otherwise find entree to a large conference like Cs break that invisible ceiling. It's also why C's the Day offers a guaranteed publication in one of three journals to the winner. This is the point that sets most academics off into a trolling frenzy. As one of the journal editors who offers this prize, I will point out that all of the journals involved in the award are scholarly, peer-reviewed, well-established, even premier, open-access journals -- each espousing in its own way the values of mentoring, professionalization, collaboration, and process -- and product-oriented writing as an activity system that writing studies respects. And each of these journals has non-peer-reviewed sections, which are where the C's the Day award winners are placed (unless their argument is appropriate for one of our peer-reviewed sections). Most authors (not just the game winners) are sent through multiple rounds of revision before their articles are even accepted, because these journals practice what they preach by acculturating writers into the discipline. In my journal's case, which has a 10 percent acceptance rate for peer-reviewed sections, nearly all authors need mentoring into publication because of the experimental nature of the scholarship the journal publishes. These journals are incredibly proud of their mentoring and review processes -- embedded with values that writing studies holds dear. It should be no surprise that most of these journals are born out of digital writing studies. These journals regularly publish game-based articles and reviews. Because that's how we roll. Now, this is all probably TMI for most of you, but I wanted to lay it out here to explain how it is possible that a field can value sparkleponies as a talisman for productive, professional development. Over the last few days, I've seen discussion forums and Facebook posts saying what an important networking experience C's the Day has been for them, and I've seen more from other fields comment that they wish their field, or their major conference, had a similar ice-breaking opportunity. And the thing is: It can. A bunch of grad students started C's the Day several years ago, and it's grown tremendously, in part because those grad students became emboldened enough to approach leaders in the field to ask to incorporate the game into the major conference. Grassroots mentoring and development can work. A field doesn't have to study games as a scholarly endeavor in order to appreciate the way games can assist our field-building. Academe as a whole is just one big game, so what's the big deal in making one part of that game a little more explicit, to the benefit of all? This doesn't mean game-playing is for everyone. But for scholars who may not have "appropriate" or traditional or elite ways of being introduced to the field, it's an alternative that has proven to work. But this alternative is certainly based on the fit factor as well. I'm the kind of person who fits better in a nontraditional mentoring environment than a traditional one, as evidenced by my research, teaching pedagogy, and my affiliation with the journal I edit. Or, as one of the professors in my Ph.D. program said to me when I was going on the job market the first time: "Cheryl, you must not want to work for anyone who doesn't have a sense of humor." Indeed. So my call to mentors and mentees alike: Choose the method of professionalization that works with your personality, your academic identity, and your resources. Acknowledge that your mentor or mentee may have a different path of achievement than you do. It's O.K. Because, at the root of it, everyone still needs to be able to articulate their research and teaching within a smart, cogent framework to others. Or, as one C's the Day quest suggests: Explain your research in a coherent way in 15 seconds to a luminary in your field. Elevator pitches are just one way of practicing job-market skills. If you want to win a sparklepony for doing so, more power (and levels) to you.
{ "pile_set_name": "OpenWebText2" }
Helpful Links Water Quality Management Plan The Tennessee portion of the Red River Watershed is located in Middle Tennessee and includes parts of Cheatham, Davidson, Montgomery, Robertson, Sumner and Stewart counties. It is approximately 1,444 square miles (801 square miles in Tennessee) and drains to the Cumberland River. There are 57 known rare plant and animal species in the Tennessee portion of the Red River Watershed. Other sites within the Red River Watershed include: Cedar Hill Swamp is a 200-acre area managed by TWRA in Robertson County.
{ "pile_set_name": "Pile-CC" }
UNPUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT No. 09-2277 DAVID HENRY ROGERS, Plaintiff – Appellant, v. R. S. BURKE, JR. as Agent for the U.S. Veterans Administration, personally and individually; U.S. VETERANS ADMINISTRATION, Defendants – Appellees. Appeal from the United States District Court for the Eastern District of North Carolina, at New Bern. Louise W. Flanagan, Chief District Judge. (5:09-cv-00068-FL) Submitted: May 20, 2010 Decided: May 24, 2010 Before WILKINSON, NIEMEYER, and DAVIS, Circuit Judges. Affirmed by unpublished per curiam opinion. David Henry Rogers, Appellant Pro Se. Edward D. Gray, Assistant United States Attorney, Raleigh, North Carolina, for Appellees. Unpublished opinions are not binding precedent in this circuit. PER CURIAM: David Henry Rogers appeals the district court’s order dismissing his claims of “malfeasance” and intentional infliction of emotional distress against the Veterans’ Administration and one of its officials. We have reviewed the record and find no reversible error. Accordingly, we affirm for the reasons stated by the district court. Rogers v. Burke, No. 5:09-cv-00068-FL (E.D.N.C. Nov. 3, 2009). We dispense with oral argument because the facts and legal contentions are adequately presented in the materials before the court and argument would not aid the decisional process. AFFIRMED 2
{ "pile_set_name": "FreeLaw" }
<?xml version="1.0" encoding="utf-8"?> <FrameLayout xmlns:android="http://schemas.android.com/apk/res/android" xmlns:tools="http://schemas.android.com/tools" android:id="@+id/container" android:layout_width="match_parent" android:layout_height="match_parent" tools:context=".MainActivity" />
{ "pile_set_name": "Github" }
Q: Scope between methods Another newbie question. I am trying to understand how to use scope effectively to organise my projects using classes to hold the data instead of having everything on the view controller. So, I am working on a couple of versions of a simple project to understand how scope works. I have a view controller hooked to a view. In that view there are buttons that when clicked show images. I want to add another button that randomizes the images. I also have a class called "Cards" to hold the cards and the methods for creating and shuffling the cards. I have duplicated the project, so I have one that works and one that doesn't. First project. These are the files: view controller h file: #import <UIKit/UIKit.h> #import "Cards.h" @interface ViewController : UIViewController - (IBAction)buttonPressed:(id)sender; @end view contoller m file: #import "ViewController.h" @interface ViewController () @end @implementation ViewController - (void)viewDidLoad { [super viewDidLoad]; Cards *instance = [[Cards alloc] init]; instance.images = [instance createImages]; NSLog(@"I've got %lu Images", (unsigned long)instance.images.count); instance.shuffled = [instance shuffleImages]; NSLog(@"Image numbers shuffled: %@", instance.shuffled); } - (IBAction)buttonPressed:(id)sender { //Nothing hooked to this yet } - (void)didReceiveMemoryWarning { [super didReceiveMemoryWarning]; // Dispose of any resources that can be recreated. } @end Cards h file: #import <UIKit/UIKit.h> #import <Foundation/Foundation.h> @interface Cards : NSObject // Creating Images @property NSMutableArray *images; - (NSMutableArray*) createImages; //Shuffling Images @property NSMutableArray *shuffled; - (NSMutableArray*) shuffleImages; @end Cards m file: #import "Cards.h" @implementation Cards - (NSMutableArray*) createImages{ self.images = [[NSMutableArray alloc] initWithObjects: [UIImage imageNamed:@"Image1.png"], [UIImage imageNamed:@"Image2.png"], [UIImage imageNamed:@"Image3.png"], [UIImage imageNamed:@"Image4.png"], nil]; return self.images; } - (NSMutableArray*) shuffleImages{ NSUInteger imageCount = [self.images count]; NSMutableArray *localvar = [[NSMutableArray alloc]init]; for (int tileID = 0; tileID < imageCount; tileID++){ [localvar addObject:[NSNumber numberWithInt:tileID]]; } for (NSUInteger i = 0; i < imageCount; ++i) { NSInteger nElements = imageCount - i; NSInteger n = (arc4random() % nElements) + i; [localvar exchangeObjectAtIndex:i withObjectAtIndex:n]; } return localvar; } @end This works and I get the expected output on the console: 2015-12-31 23:43:44.885 VCScope[2138:533369] I've got 4 Images 2015-12-31 23:43:44.886 VCScope[2138:533369] Image numbers shuffled: ( 0, 2, 3, 1 ) Second project: What I want to do, is put a button to randomize the images only when the button is pressed and not as part of viewDidLoad. So, in my second project, I have the same files for the view controller.h and for both the Cards.h and Cards.m, but on the view controller.m I move the calling of the method for the shuffling of the cards to a UIButton method, like so: new View controller m file: #import "ViewController.h" @interface ViewController () @end @implementation ViewController - (void)viewDidLoad { [super viewDidLoad]; Cards *instance = [[Cards alloc] init]; instance.images = [instance createImages]; NSLog(@"I've got %lu Images", (unsigned long)instance.images.count); } - (IBAction)buttonPressed:(id)sender { Cards *instance = [[Cards alloc] init]; instance.shuffled = [instance shuffleImages]; NSLog(@"Image numbers shuffled: %@", instance.shuffled); } - (void)didReceiveMemoryWarning { [super didReceiveMemoryWarning]; // Dispose of any resources that can be recreated. } @end This outputs to the console the following: 2015-12-31 23:32:07.495 4StackVCScope[2029:486608] I've got 4 Images 2015-12-31 23:32:11.924 4StackVCScope[2029:486608] Image numbers: ( ) So it's not working and I am guessing it's to do with scope. Can someone throw some light into this? thanks A: Welcome to Stack Overflow. You mention you're a "newbie", but it would be helpful to know what background you have so I know how much detail is needed here. Cards *instance = [[Cards alloc] init]; creates a fresh Cards instance in a local variable. You are doing this separately inside -viewDidLoad and in -buttonPressed:. If you want one Cards object per ViewController, then the view controller needs to have per-instance storage for it. There are several possible ways to do this. Which one you pick is a question of code style and API design. If the Cards instance is for internal use only, you can declare an ivar in your @implementation block: @implementation ViewController { Cards *_cards; } - (void)viewDidLoad { _cards = ... } - (IBAction)buttonPressed:(id)sender { access _cards } @end (Ivars can be declared in the public @interface as well, but I wouldn't recommend that as it leaks implementation details.) Or you can use a property in the public interface: // in your .h file: @interface ViewController @property (nonatomic) Cards *cards; @end // in your @implementation: - (void)viewDidLoad { self.cards = ... } - (IBAction)buttonPressed:(id)sender { access self.cards } A property can also be privately declared in a class extension: // in your .m file: @interface ViewController () @property (nonatomic) Cards *cards; @end
{ "pile_set_name": "StackExchange" }
It was three whole years ago we told you about the "Naked Girls Reading Science Fiction" event held by The Pinchbottom Burlesque, but now we're happy to report those who prefer people of the penis-ed variety reading genre fiction aloud to them will finally have their chance, courtesy of Ham Pants Productions and Stage Werx Theatre. The only catch? It's all Cthulhu, baby. There is only one name synonymous with cosmic horror: H.P. Lovecraft. There are only a few dudes who know how to read and are willing to do it in front of a live audience ... uncloaked. Without a stitch. Au Naturel. Just in time for Valentine's Day, Ham Pants Productions and Stage Werx Theatre are proud to present: Naked Dudes Reading Lovecraft. On February 13, 2013 at 8:00 pm, more than a handful of dudes will read a handful of Lovecraft, in the altogether. This is the closest some of us will get to romance this Valentines day. Hey, if you're going to be alone on Valentine's Day, you might as well spend it with a few tentacle monsters, right? And I'm sure the Lovecraft reading will be good, too. The event's site is here, should you need it.
{ "pile_set_name": "Pile-CC" }
Q: RxJS handling closure variables My scenario is following: - Reach to database for some object - After obtaining base object grab it's additional data - Merge additional data to base object I wish to write it in pure functional manner (i.e. with no side effects) but so far I'm unable to achieve it: getMeterPointWithMeterDatabyId(id: number, allowEmpty: boolean = false): Observable<MergeObject> { const params = this.getEmptyParams(); let mp: MergeObject; // This is my enclosed objects I refer to return this.masterService.getMasterById(params) .concatMap<MergeObject, MergeData[]>((master: MergeObject) => { mp = master; // This is side effect generation return this.meterService.getMasterData(params); }) .concatMap<MasterData[], MergeObject>((md: MasterData[]) => { mp.data = md.slice(); // Even more side effects return Observable.of(mp); // Final result generated form impure result }); I think I have a ggo understanding of how Rx works when there is no cycle dependency between objects (i.e. my call chain produced A -> B -> C) but I'm loosing my confidence when I need to step back at one processing step to grab some previous data (i.e. A -> B -> A , where A finally contains B) EDIT: As far a si know, zip operator is doing the trick, but I'd like to know, is it possible to achieve such manually A: If you actually need the base object to query the details (i.e., the requests must happen consecutively), you can do this.service.getMaster(id) .switchMap(master => this.service.getDetails(master) // .catch(…) <-- if you want to continue even if fetching the details fails .map(details => merge(master, details)) ) .subscribe(); The trick is to simply nest the map inside the switchMap, that way master stays in scope without having to jump through hoops. If the details request is actually independent, you can fire both in parallel using Observable.forkJoin( this.service.getMaster(id), this.service.getDetails(id) // .catch(…) <-- if you want to continue even if fetching the details fails ) .map(([master, details) => merge(master, details)) .subscribe(); The technique of delinearizing an operator chain, that is transforming source$ .switchMap(data1 => transformationA(data1)) // From here on out, you only see data1 .switchMap(data2 => transformationB(data2)) // From here on out, you only see data2 .subscribe(data3 => …); into source$ .switchMap(data1 => transformationA(data1) .switchMap(data2 => transformationB(data2) // You can see both data1 and data2 here! ) .subscribe(data3 => …); is useful quite often in order to keep data from multiple steps in scope, e.g. to combine them. It's definitely something to always keep in mind: you can also nest.
{ "pile_set_name": "StackExchange" }
InterCeltic Festival opens in France Officials estimate that nearly 400,000 people will stampede the city of Lorient in the French region of Brittany to hear oddities like techno-bagpipes as the 28th InterCeltic Festival begins Friday. Among the musicians leading the bill at the festival, which promises to unite more than 4,500 artists, will be Alan Stivell, whose works fuse Celtic, rock and techno music, including those bagpipes. The festival runs through Aug. 16.
{ "pile_set_name": "Pile-CC" }
Facebook instituted its biggest executive shakeup in its 15-year history this week, appointing new leaders for WhatsApp, Messenger and Facebook’s core app while giving other longtime Facebook executives new responsibilities, including a new effort to tackle blockchain technology. The moves, which were announced internally to employees today, are meant to improve executive communication and user privacy, but the changes also come as Facebook contends with the backlash from the U.S. presidential election, revelations of manipulation by the Russian government and the recent Cambridge Analytica scandal. CEO Mark Zuckerberg has reorganized the social giant’s product and engineering organizations into three main divisions, including a new “Family of apps” group run by Chief Product Officer Chris Cox, the executive previously in charge of the core Facebook app. Cox will now oversee Facebook, Instagram, WhatsApp and Messenger, according to multiple sources, four social apps with a combined reach of more than five billion monthly users. Facebook is also building a new team dedicated to blockchain technology. David Marcus, the executive in charge of Facebook’s standalone messaging app, Messenger, is leaving that post to run the blockchain group, these sources said. That new team will fall under one of the other three divisions, referred to as “New platforms and infra,” which will be managed by CTO Mike Schroepfer. Facebook’s AR, VR and artificial intelligence efforts will also live under Schroepfer’s division. Longtime Facebook exec Javier Olivan, the company’s VP of growth, will oversee the third division, called “Central product services,” which includes all of the shared features that operate across multiple products or apps such as ads, security and growth. Surprisingly, no one appears to be leaving Facebook. Just a lot of old faces in new places. You may have noticed from the diagram that almost all of Facebook’s top product and engineering execs are men. That’s true, though Facebook does have a number of high ranking and influential female product executives that aren’t directly involved in these changes. For example: Fidji Simo, who runs video; Deb Liu, who runs Marketplace; and Julie Zhuo, who runs design. Then, of course, there’s Sheryl Sandberg on the business side of things. The changes all come at an interesting time for Facebook and Zuckerberg, who has been openly discussing his need to take more responsibility for Facebook’s impact on the world. Zuckerberg’s New Year’s resolution was to fix Facebook, and restructuring the team is clearly part of that fix. The hope is that these new roles will keep more open lines of communication among executives without hurting the speed Facebook is known for. (“Move fast and break things,” remember?) The new product and engineering orgs have been divided into three key groups. 1. The Family of Apps This is the group Cox will oversee, which includes WhatsApp, Messenger, Instagram and the core Facebook app. Instagram CEO Kevin Systrom will continue to run Instagram, but the other three apps are getting new leaders: Chris Daniels, the VP of Facebook’s Internet.org group, is taking over WhatsApp following the departure of CEO Jan Koum last week. Daniels has been with Facebook since 2011, and has lots of experience building products for an international audience in areas where wifi and infrastructure are weak. David Marcus, the head of Facebook’s standalone messaging app, Messenger, is leaving that role but staying at the company. He’s moving over to run a new team exploring blockchain technology. Stan Chudnovsky, the head of product at Messenger, is taking over the Messenger app and team. Will Cathcart, one of Cox’s top product lieutenants, is taking over all of product for Facebook’s core app. Cathcart has been at Facebook since 2008, joining from Google, and was responsible for Facebook’s profiles team. (That includes the group working on Facebook’s new dating service.) Having all four product leaders roll up to Cox is meant to improve communication among the products. Previously, the leaders of all of these teams had different bosses. Koum rolled up to Zuckerberg, Systrom rolled up to Schroepfer and Marcus reported to Olivan. As Facebook increasingly builds more features that live inside all of the apps (e.g. Stories), it makes sense to have their leaders working closer together. 2. New Platforms and Infra This group will be under the direction of Mike Schroepfer, Facebook’s CTO. As you can probably guess from the name, this group will incorporate all of Facebook’s longterm product and business efforts, like virtual reality, augmented reality and the newly formed blockchain group. Andrew “Boz” Bosworth, who runs Facebook’s AR, VR and hardware teams, will continue to report to Schroepfer. Boz took over those teams last August following years running Facebook’s advertising efforts. David Marcus will report to Schroepfer in his new role running Facebook’s exploratory blockchain group. The company isn’t saying anything about the team, but Marcus is on the board of cryptocurrency exchange Coinbase, so there is a clear interest in the technology there. (He had also previously worked at PayPal and had founded a mobile payments startup.) Jay Parikh, Facebook’s top engineering executive, will oversee a new product team focused on privacy products and initiatives (more on that below). Workplace, Facebook’s enterprise product aimed at competing with Slack, will fall under Schroepfer’s purview. That team is run by Kang-Xing Jin, known internally as KX, and one of Facebook’s longest-tenured product executives. He actually was a classmate of Zuckerberg’s at Harvard. Jerome Pesenti, who leads Facebook’s Artificial Intelligence group, will also report to Schroepfer. Pesenti just joined Facebook this year from IBM, where he worked on “Watson” technology. 3. Central Product Services All of the other product and engineering functions — ads, security, growth — will fall to another longtime Facebooker, Javier Olivan, who has been with the company more than a decade. Olivan has run Facebook’s growth team for years and is credited for helping Facebook achieve the massive scale it’s now known for. Olivan will also oversee a lot of important parts of the Facebook business. Mark Rabkin, who oversees ads and Facebook’s local efforts, will report to Olivan. Naomi Gleit, who has been at Facebook since mid-2005 (even longer than Cox), runs community growth and integrity as well as Facebook’s social good products, like the donate button. She’s also the leader of product management for the entire company. Alex Schultz, who has been at Facebook since 2007 and runs “growth marketing, data analytics (data science & data engineering) and internationalization for Facebook,” according to his LinkedIn, also reports to Javi. Here are a few more changes taking place at Facebook this week. Instagram and Facebook are swapping key product executives Adam Mosseri, the Facebook product executive who runs News Feed, is headed over to Instagram to become the company’s new VP of product. In his old job, Mosseri was tasked with building and then explaining Facebook’s ever-changing News Feed algorithm to journalists and media companies, and he became a savvy Twitter user in the process. The company didn’t share specifics about his new role, but it seems fair to assume his experience running one feed at Facebook will help running another feed at Instagram. You might now be thinking: What about Instagram’s existing VP of product, Kevin Weil? Good question. Weil is leaving Instagram and headed over to Facebook’s newly formed blockchain team, the one that David Marcus is running. So a few new places for a couple of familiar faces. A change to Facebook’s communication team Facebook is shuffling the top of its communication team, too. Caryn Marooney, who has been running the day-to-day operations for all Facebook communications over the past two years, is handing over some of her responsibilities to PR veteran Rachel Whetstone, who joined Facebook last summer. Marooney will handle product communications and Whetstone is taking over corporate comms. Whetstone is very well known in Silicon Valley. She joined Facebook after running communications and policy at Uber during the company’s Travis Kalanick-inflicted PR nightmare. Before that, she worked at Google for 10 years also running communications and policy. She’s climbed up Facebook’s internal ranks very quickly and is already an influential voice in the room when it comes to policy decisions, sources say. Sign up for the newsletter Recode Daily Email (required) By signing up, you agree to our Privacy Notice and European users agree to the data transfer policy. Subscribe
{ "pile_set_name": "OpenWebText2" }
Taking the torch from the now finally deceased Saw franchise for being the horror franchise that just won’t die, Paranormal Activity releases the latest film in the line today, Paranormal Activity 4. Largely responsible for the glut of found footage films in recent years, and while a number of these are quite good, Paranormal Activity had a bit of a tired premise even the first time around, and four movies later, there’s hardly any scares or life left in the series. In spite of this, to say nothing of brutal reviews, the latest movie is expected to set October box office records, and with Paranormal Activity 5 already in development, it looks like Hollywood plans to ride this gravy train as long as shmucks will pay to be ‘scared’ of moving furniture and levitating teenage girls. I however, think the masses deserve a better breed of terror, and I have just the film for anyone looking for something a tad more horrifying than dead-four-time-over jump gags. You see my dear readers, as I fan of both horror movies and found footage films, I have am here to showcase a living legend of both genres. The movie is a bona-fide urban legend, whisperings of which have been circling around film buff circles since the 1980s. It is a grindhouse gem that manages to be both an anti-exploitation film, and yet is perhaps the greatest example of that very same genre. It is a film so raw, so commanding and so stomach-curdling in its grotesquery, that it is still banned in many countries, and impossible to legally purchase in its true form in countless others. It has a core message that will bring you to your knees, and violence so brutally realistic that not only has the film been banned in over fifty countries, but the director was briefly charged with murder when police saw the movie’s death scenes, and would not drop the case until he proved his cast was still alive. It has spawned multiple imitators and entire sub-genres, yet never any equal in terms of both disturbing brutality and powerful tone and direction. I am talking of course, about Cannibal Holocaust. No doubt a number of cinephiles out there reading this just felt your bowels turn to ice from that title alone, and for good reason. A few of my more devout readers may have seen me mention it a few times before, on both my list of Must See Horror Movies, and my list of the Top Ten Most Controversial Films of All Time, and it earned a spot on both, have no doubt. Given that this weekend will spend millions of dollars on another half-assed sequel to the rather blasé Paranormal Activity, and I don’t have the power to force them to watch this instead, I figured now is as good a time as any to showcase the underrated horror classic that is Cannibal Holocaust. Made in the midst of the heyday of Italian grindhouse cinema, which has a deserved reputation for gore and controversy in its own right, Cannibal Holocaust is perhaps the most (in)famous product of not only the oddly expansive cannibal subgenre, but the entirety of Italian exploitation films. Almost since its first release in 1980, Cannibal Holocaust has been an immensely controversial film, and has left critics divided over its artistic merits, or lack thereof, since day one. In spite of the controversy, or to an extent because of it, it has earned its place as a cult classic that goes far beyond that of nearly any other of the era’s exploitation films typical fan base, earning accolades from publications like Total Film, IGN and Wired, celebrities including the likes of Sergio Leone, Sylvester Stallone and Sam Raimi, and of course, your humble narrator. Having been first introduced to the film in the US Army during one of my unit’s regular movie nights, when a fellow soldier plopped the movie into the DVD player telling us this would become the most disturbing and terrifying film we’d ever watched. He was right, and the film quickly earned a spot as one of my favorites for being one of the most brutal and shocking films I’ve ever seen, and one that never gets any easier to watch at that. I’ve shared it with friends, whose reactions range from stunned silence, to screams, to in the case of a long-time horror fan friend of mine, total and utter incomprehension. Now, I share it with you – consider yourself cautioned. The movie itself (Spoilers!) opens with anthropologist Harold Monroe hired by a television studio to head off into an uncharted stretch of the Amazon jungle, in hopes of tracking down a crew of famed documentary filmmaker Alan Yates and his crew, who had gone missing while making a documentary called The Green Inferno, which showcases Amazonian cannibal tribes. Along with his guide, he discovers that the local tribes have experienced some sort of unrest at the hands of the filmmakers – unrest which untimely ended with one of the tribes making a meal out of them. After some negotiations over a meal – yes, man is served, hint hint – Monroe manages to obtain their film reels in exchange for a tape recorder. Back at the studio, which has asked Monroe to host the broadcast of the recovered documentary, which he accepts if allowed to review the film first, and it is here that Cannibal Holocaust delves into truly terrifying territory. Yates and his crew, which we were led to believe were intrepid film pioneers culled by savage cannibals, turn out to be cutthroats willing to commit acts that would make Col. Kurtz take pause in efforts to get shocking and sensationalist material for their ‘documentary’. In their own trek through the jungle, they burn down a village, slaughter some animals, kill a number of natives, and rape a few others, all in the name of great television. By the time the locals turn their spears on them, the filmmakers fully deserving to be served on a spit, the final frame on Yates’ bloodied face as a screams as a stone axe falls, we see that savages come in many forms, and not always the forms we expect. The story and the execution of it is what in the end I would wager has given Cannibal Holocaust both the longevity and fanbase it has – as I mentioned before, Italian grindhouse cinema did not lack an abundance of gore and controversy, and there is no shortage of other film, even other cannibal films, that are for more disgusting, disturbing or diabolical. What makes Cannibal Holocaust the memorable film it is ultimately comes down to the story, which in addition to the creative narrative angle which has since managed to spawn two entire sub-genres, tells one a very potent satire of media sensationalism and the savagery of the modern world. The angle involving the documentary filmmakers was at the time a slap in the face to the Italian Mondo films, though it has aged quite nicely into a before its time satire on the modern media, both in its quest for ratings and its willingness to sacrifice journalistic integrity and good taste to get them. Much the same, one of the overriding themes of the movie is the comparison between modern civilization and the tribal cultures, and its message that we are every bit as savage as they are. Perhaps what makes that message so effective is that we, the audience become complicit in the act ourselves – literally the entire first half of the movie sets up that these filmmakers were victims of barbaric savages, cannibals no less, and we buy into it, only for the movie to turn our prejudices on our head when we find out who the real monsters are. In another swipe, how many folks watch the movie having heard of its reputation for violence must feel pangs of guilt once the final credits roll? The story and themes are almost universally ignored in the horror genre, especially much of the found footage subgenre, so the focus on it Cannibal Holocaust makes it something of a rarity, resulting something you’d have expected if Heart of Darkness was about sensationalist media as opposed to colonialism. Of course, there is no denying for what brilliance of storytelling there is, the film has a well-earned reputation for it’s almost unmatched of levels of violence and depravity, and from here no doubt stems the majority of controversy surrounding the film. I wasn’t exaggerating earlier describing the movie’s reputation either – it’s easily one of the most shocking films I’ve ever watched, and understandably one of the most controversial films of all time. Content included massive amounts of both blood and nudity, vivid scenes of rape and murder, real animal slaughter and some of the most photo-realistic violence ever put to screen. A lot of it is so graphic oven the most stoic screen-junkies will find their stomachs turning, and thanks to the superb work with the makeup and gore effects, the line between what is real and what is not is blurry as static, adding to the already palpable tension and unease of the movie. Describing some of the scenes is difficult, let alone watching them. Worth special note is what has sparked the most controversy with the film, the filmed killings of seven animals in the movie, including one where they carve open a turtle showcasing its bubbling innards and still blinking eyes for the camera, which will haunt you forever. While I do find it horrendous, it was a tragic commonality of movies in the era – one that always gets overlooked is Apocalypse Now, which has two or three animals killed on screen – and it’s somewhat sad that in Cannibal Holocaust gets most of its infamy from this, as opposed to, for one example, the film within the film, Last Road to Hell, which consists of actual footage of executions and civil war in Nigeria, yet people seem to care more for Amazonian muskrats. Needless to say, between the impaled tribal women, dismembered muskrats, and Nigerian executions, there is something to shock, scare and shake anyone, and the movie is deservedly infamous for such. That said, between the substance of its story and themes, or its myriad of controversies, few would deny the skill put into the movie, or the impact the film has had. The movie’s cinematography and editing is handled masterfully, as savage cruelty is eerily juxtaposed with beautiful scenery and Riz Ortolani’s terrific score, which makes every scene all the eerier. Disregarding its fame from controversy, the impact of the movie is drastically underrated – in addition to its influence on the horror genre and its impact on a number of filmmakers, but for literally being the starting point of two entire subgenres, both the faux-documentary and the found footage film, the latter of which, a few exceptions aside, are all largely derivatives of Cannibal Holocaust. I’m looking at you Blair Witch! That impact, to say nothing of the current boom of found footage films is part of the reason why I would love to see a remake of Cannibal Holocaust. Hand it to someone like Quinton Tarantino or Eli Roth, both of whom claim the movie as an influence and a favorite, play up the themes and realism and remove it from its controversies – or with the miracles of modern marketing and viral media, play up entirely new ones, and you’d have a horror hit for the ages. That said, the original one is, controversies and all, one of the most memorable films I’ve ever seen, and one that years after I’ve seen it, I still can’t forget or stop talking about. Cannibal Holocaust is a hard film to classify or recommend, but it’s harder to deny it has earned its place as a cinematic milestone for reasons both good and ill – it was and still is a cinematic paradox. On one hand, it’s an unforgivably violent and exploitative work that will leave you undoubtedly uncomfortable, and on the other hand, it’s an undeniably relentless social commentary that is totally unforgettable, and the fusion of these two parts is one of the most brilliantly insane monstrous masterpieces ever filmed. While it certainly isn’t a movie for everyone – I cannot emphasize that enough – if you have the stomach for it, I recommend it highly, if only for the fact there has never been another movie quite like it. It will disturb you, make you squirm, make you scream and leave you speechless – but by movie end, you will be affected by it, and will remember it long after the final credits roll. In the end, I would call say Cannibal Holocaust is to the horror genre what A Clockwork Orange is for science fiction. It’s a milestone in terms of genre cinema that has had an impact far beyond what many people realize, and has been steeped in controversy for its content since its inception, and its story and theme work often gets lost in the firestorm. In the end, watch it for whatever discomfort it may give you, and if you find its credits outweigh its controversies will depend on you. In either case, it will stick with you long after Paranormal Activity 4 has been forgotten.
{ "pile_set_name": "OpenWebText2" }
Product search We found 192 product(s) under "View All" STYLISH OUTERWEAR FOR WOMEN Outerwear can define a woman's look. This season's outerwear adapts to any weather with style. Wrap yourself in fleece, down or faux fur on the coldest of days. Flowy and ultralight pieces for milder temperatures. Get inspired with the complete collection online, updated weekly.
{ "pile_set_name": "Pile-CC" }
Heat Michael is a pitching phenom with dreams of taking his team to the Little League World Series. Afraid of being separated in foster care, or worse, sent back to Cuba, Michael and his brother have been keeping their father’s death a secret from all but those closest to them. As the baseball season becomes more intense, a rival questions Michael’s age and insists that he show a birth certificate to prove he is not too old for little league. With no way to prove his age, no birth certificate, and no parent to stick up for him, Michael’s dream is on the line. Author: Mike Lupica
{ "pile_set_name": "Pile-CC" }
1. Field of the Invention This invention generally relates to a throttle control apparatus for an internal combustion engine. This invention specifically relates to an apparatus including a sensor for detecting the degree of opening of a throttle valve in an internal combustion engine, and a device for feedback-controlling the actual degree of opening of the throttle valve at a target degree in response to the detected degree of opening of the throttle valve. 2. Description of the Prior Art In recent years, most automotive internal combustion engines have been equipped with a sensor for detecting the degree of opening of a throttle valve. The output signal of the throttle opening degree sensor (throttle position sensor) is used by various types of control. A known throttle control apparatus includes a DC motor for moving a throttle valve, a sensor for detecting the degree of opening of the throttle valve, and a device for driving the DC motor in response to the detected degree of opening of the throttle valve to control the actual degree of opening of the throttle valve. In some automotive vehicles with automatic transmissions, a sensor detects the degree of opening of a throttle valve, and the automatic transmission is controlled in response to the detected degree of opening of the throttle valve according to a predetermined transmission control map. The characteristics of throttle opening degree sensors (throttle position sensors) tend to vary from sensor to sensor. In addition, the characteristics of throttle opening degree sensors tend to vary with ageing thereof. Such variations in the sensor characteristics cause errors in the sensor output signal. As will be described hereinafter, there are various known apparatus for correcting an error in the output signal of a throttle opening degree sensor. Japanese published unexamined patent application 58-10131 and Japanese published unexamined patent application 63-180755 disclose throttle control apparatus in which a switch serves to detect the fully-closed position of a throttle valve, and the output signal of a throttle opening degree sensor which occurs when the switch is turned on is used as an indication of the fully-closed position of the throttle valve to correct an error in the sensor output signal. Japanese published unexamined patent application 58-122326 and Japanese published unexamined patent application 3-107561 disclose throttle control apparatus in which the detected value currently prodded by a throttle opening degree sensor is compared with a memorized idle value (fully-closed position value). When the current detected value is smaller than the memorized idle value, the current detected value is memorized as a new idle value so that the memorized idle value is updated. Otherwise, the memorized idle value is held as it is. The updating of the memorized idle value corrects an error in the sensor output signal. In the throttle control apparatus of Japanese patent application 58-122326, a determination is made as to whether the detected value provided by the throttle opening degree sensor equals a same value a given number of times or for a given length of time. In cases where the detected value provided by the throttle opening degree sensor equals a same value the given number of times or for the given length of time, when the same value is smaller than the memorized idle value, the current detected value is memorized as a new idle value so that the memorized idle value is updated. In the throttle control apparatus of Japanese patent application 3-107561, engine operating conditions corresponding to the throttle fully-closed position can be detected by a suitable device. In cases where such engine operating conditions are actually detected, when the memorized idle value is smaller than the detected value currently provided by the throttle opening degree sensor, the memorized idle value is corrected into an increased idle value. The correction of the memorized idle value is intended to prevent am adverse affection of noise components of the sensor output signal. The above-mentioned known throttle control apparatus have problems as follows. Generally, operating conditions of engines (for example, the rates of air flow into the engines) which occur at the fully-closed position of a throttle valve vary from engine to engine. Specifically, air leaks through throttle valves of engines even when the throttle valves are fully closed, and the rates of air leakage vary from engine to engine. Therefore, the relations between the throttle opening degrees detected by throttle position sensors and the engine operating conditions vary from engine to engine. Such a variation in the relations causes another type of error in the sensor output signal which adversely affects control responsive to the sensor output signal and the engine operating conditions. The above-mentioned known throttle control apparatus can not correct this type of error in the sensor output signal. In addition, the relation between the throttle opening degree detected by the throttle position sensor and the engine operating conditions varies with ageing of the sensor and a change in the engine operating conditions. Such a variation in the relation causes a type of error in the sensor output signal which adversely affects control responsive to the sensor output signal and the engine operating conditions. The above-mentioned known throttle control apparatus can not correct this type of error in the sensor output signal.
{ "pile_set_name": "USPTO Backgrounds" }
The story goes that the very first gathering of Occupy Wall Street began as an old-fashioned top-down rally with speakers droning on—until a Greek student (and perhaps—an anarchist?) interrupted it and demanded that they hold a proper horizontal assembly instead. She and some of the youngsters in attendance sat down in a circle on the other side of the plaza and began holding a meeting using consensus process. One by one, people trickled over from the audience that had been listening to speakers and joined the circle. It was August 2, 2011. Here, in the origin myth of the Occupy Movement, we encounter a fundamental ambiguity in its relationship to organization. We can understand this shift to consensus process as the adoption of a more inclusive and therefore more legitimate democratic model, anticipating later claims that the general assemblies of Occupy represented real democracy in action. Or we can focus on the decision to withdraw from the initial rally, seeing it as a gesture in favor of voluntary association. Over the following year, this internal tension erupted repeatedly, pitting democrats determined to demonstrate a new form of governance against anarchists intent upon asserting the primacy of autonomy. Though David Graeber encouraged participants to regard consensus as a set of principles rather than rules, both proponents and authoritarian opponents of consensus process persisted in treating it as a formal means of government—while anarchists who shared Graeber’s framework found themselves outside the consensus reality of their fellow Occupiers. The movement’s failure to reach consensus about the meaning of consensus itself culminated with ugly attacks in which Rebecca Solnit and Chris Hedges attempted to brand anarchist participants as violent thugs. How did that play out in the hinterlands, where small-town Occupy groups took up the decision-making practices of Occupy Wall Street? The following narrative traces the tensions between democratic and autonomous organizational forms throughout the trajectory of one local occupation. This text is an installment in our series exploring an anarchist analysis of democracy. Democracy versus Autonomy in the Occupy Movement: A Narrative A decade and a half ago, I participated in the so-called “anti-globalization movement,” so described by journalists who preferred not to say “anticapitalist.” Beginning with a groundswell of local initiatives, it culminated in a string of massive riots at international trade summits from Seattle in November 1999 to Genoa in July 2001. Although I had been an anarchist for some years already, I learned about consensus process in the course of those experiences. Like many other participants, I believed that this form of decision-making pointed the way to a world without government or capitalism. We cherished the seemingly impossible dream that one day that decision-making process might be taken up by the population at large. Ten years later, I visited the Occupy Wall Street encampment at Zuccotti Park. It had only existed for two weeks, yet it had already developed its political culture: daily assemblies, “mic check,” consensus process. This was all familiar to me from my “anti-globalization” days, though most people there clearly did not share that background. I heard a lot of legalistic and reformist rhetoric in the course of my brief visit. At the same time, this was what we had dreamed of, our practices spreading outside our milieu. Could the practices themselves instill the political values that had originally inspired us to employ them? Some of my comrades had argued that directly democratic models could be a radicalizing step towards anarchism. The following months put that theory to the test. Two weeks after my visit to Manhattan, I was back in my hometown in Middle America, attending our Occupy group’s second assembly. A hundred people from a wide range of backgrounds and political perspectives were debating whether to establish an encampment. It’s not easy for a crowd arbitrarily convened through an open invitation on Facebook to make a decision together. Some argued against occupying, claiming that the police would evict us, insisting we should apply for a permit first. In the nearest city, occupiers had applied for a permit but were only granted one lasting a few hours; everyone who remained after it expired was arrested. A few of us thought it better to go forward without permission than to embolden the authorities to believe we would comply with whatever was convenient for them. A different facilitator would have let the debate remain abstract indefinitely, effectively quashing the possibility of an occupation in the name of consensus. But ours cut right to the chase: “Raise your hand if you want to camp out here tonight.” A few hands went hesitantly up. “Looks like five… six, seven… OK, let’s split into two groups: those who want to occupy, and everyone else. We’ll reconvene in ten minutes.” At first there were only a half dozen of us meeting on the occupiers’ side of the plaza, but after we took the first step, others drifted over. Ten minutes later, there were twenty-four of us—and that night dozens of people camped out in the Plaza. I stayed up all night waiting for the police to raid us, but they never showed up. We’d won the first round, expanding what everyone imagined to be possible—and we owed it to people taking the initiative autonomously, not to reaching consensus. Our occupation was a success. Over the first few weeks, scores of new people met and got to know each other through demonstrations, logistical work, and nights of impassioned discussion. The nightly assemblies served as a space to get to know each other politically. First, we heard a wide range of testimonials about why people were there. These ranged from boring to fascinating, but they died out swiftly once the business of making decisions via assemblies got underway. Next, we weathered lengthy debates about whether there should be a nonviolence policy, with nonviolence serving as a code word for legalistic obedience. Thanks to the participation of many anarchists, this discussion was split pretty much down the middle, but it enabled many occupiers who had never been part of something comparable to hear some new arguments. It was interesting to watch so many people go through such a rapid political evolution. I enjoyed the debates, the drama of watching middle-class liberals struggle to converse on an equal footing with anarchists and other angry poor people. On the other hand, the assemblies were ineffective as a way to make decisions. After weeks of grueling daily sessions, we gave up entirely on formulating a mission statement about our basic goals, consensus having been repeatedly blocked by a lone contrarian. Some people managed to push a couple small demonstrations through the consensus process, but they attracted almost no participants. The assembly’s stamp of approval did not correlate with people actually investing themselves; the momentum to make an effort succeed was determined elsewhere. While the nightly assemblies helped us get to know each other politically, if you wanted to get to know people personally, you had to spend time at the encampment. Standing night watch, facing off with drunk college students and other reactionaries, I became acquainted with many of the occupiers who had first arrived as disconnected individuals. It was those connections that gave us cause to be invested in each other’s efforts over the following months. Unexpectedly, the liberals were among the most invested in the protocol of consensus process—however unfamiliar it was, they found it reassuring that there was a proper way of doing things. This emphasis on protocol created rifts with the actual inhabitants of the encampment, many of whom felt ill at ease communicating in such a formal structure; that class divide proved to be a more fundamental conflict than any political disagreement. From the perspective of the liberals, there was a democratic assembly in which anyone could participate, and those who did not attend or speak up could not complain about the decisions made there. From the vantage point of the camp, the liberals showed up for an hour or two every couple days, and expected to be able to dictate decisions to people who were in the camp twenty-four hours a day—often not even sticking around to implement them. As a part of the minority that was familiar with consensus process yet simultaneously a denizen of the camp proper, I could see both sides. I tried to explain to the liberals who just showed up for the assemblies—the ones who understood Occupy as a political project rather than a social space—that there were already functioning decision-making processes at work in the encampment, however informal, and if they wanted to establish better relations with the residents of the encampment, they should take those processes seriously and try to participate in them, too. After the first few weeks, the flow of new participants slowed. We became a known quantity once more. Consequently, we began to lose our leverage on the authorities. Meanwhile, it was getting colder out, and winter was on the way. Based on our experience attempting to formulate a mission statement or call for demonstrations, it seemed clear to us that if there was to be a next step, it would have to be decided outside the general assemblies. I got together with some friends I had known and trusted for a long time—the same group that had called for Occupy in our town in the first place. We discussed whether to occupy a vast empty building a few blocks from the plaza. Most of us thought it was impossible, but a few fanatics insisted it could be done. We decided that if they could get us inside, we would try to hold onto it. But the plan had to be a secret until we were in, so the police couldn’t stop us. The building occupation was a success. Over a hundred people flooded into the building, setting up a kitchen, a reading library, and sleeping quarters. A band performed, followed by a dance party. That night, dozens of people slept in the building rather than at the plaza, relieved to be out of the cold. Once again, I stood watch all night, waiting for the police—the stakes were higher this time, but they didn’t show up. Spirits were high: once again, we had expanded the space of possibility. The following afternoon, as we continued cleaning and repairing the building, a rumor circulated that the police were preparing a raid. Several dozen of us gathered for an impromptu meeting. It struck me how different the atmosphere was from our usual general assemblies. There were no bureaucratic formalities, no deadlocks over minutia. No one droned on just to hear himself speak or stared off listlessly. There was no payoff for grandstanding or chiding each other about protocol. Here, there was nothing abstract about the issues at hand. We were putting our bodies on the line just by being present; these were real choices that would have immediate consequences for all of us. We didn’t need a facilitator to listen to each other or stay on topic. With our freedom at stake, we had every reason to work well together. The day after the raid, a huge crowd gathered at the original encampment for a contentious general assembly—the biggest and most energetic our town witnessed throughout the entire sequence of Occupy. Our decision to occupy the building, arrived at outside the general assembly, had ironically made the general assembly irresistible to everyone. Some people were inspired by the building occupation and our response to the police raid; others, who assumed the general assembly to be the governing body of the movement, were outraged that we had bypassed it; still others, who had not been interested in Occupy until now, came to engage with us because they could see we were capable of making a big impact. Even if they were only there to argue that we should “be peaceful” and obey the law, we hoped that entering that space of dialogue might expand their sense of what was possible, too. So the assembly benefitted from the building occupation, whether or not people approved of it. But they only came because of the power we had expressed by acting on our own. It was this power that they sought to access through the assembly—some to increase it, some to command it, some to tame it. In fact, the power didn’t reside in the assembly as a decision-making space, but in the people who came to it and the connections they forged there. Over the following week, people inspired by the building occupations in Oakland and our little town occupied buildings in St. Louis, Washington, DC, and Seattle. This new wave of actions pushed the Occupy movement from symbolic protests towards directly challenging the sanctity of capitalist notions of property. Our town saw its biggest unpermitted demonstrations in years. Months later, I compared notes with comrades around the country about how this mass experiment in consensus process had gone. Everywhere, there had been the same conflicts, as some people who saw the assemblies as the legitimate space of decision-making criticized those who propelled the movement forward for acting autonomously. Even in Oakland, the most confrontational encampment in the country, they never made a consensus decision to keep police out of the camp—that decision was made by individuals, independently. A friend from Oakland recounted to me how, when he prevented an officer from entering, a young reformist who had just learned the buzzwords of consensus process angrily shouted “I block you, man! I block you!” at him. In a photograph taken after the riots with which occupiers retaliated against the eviction of their encampment, someone has written on a broken window, “This act of vandalism was NOT authorized by the GA,” as if the GA were a governmental body, answerable for its subjects and therefore entitled to legitimize or delegitimize their actions. That shows a profound misunderstanding of what consensus procedure is good for. Like any tool, power flows from us to it, not the other way around—we can invest it with power, but using it won’t necessarily make us more powerful. Every single step that made Occupy succeed in our town, from the call for the first assembly to the decision to occupy the plaza to the decision to occupy a building, was the result of autonomous initiative. We never could have consensed to do any of those things in an assembly that included anarchists, Maoists, reactionary poor people, middle-class liberals, police infiltrators, people with mental health issues, aspiring politicians, and whoever else happened to stop by at random. The assemblies were essential as a space where we could intersect and exchange proposals, creating new affinities and building a sense of our collective power, but we don’t need a more participatory—and therefore even more inefficient and invasive—form of government. We need the ability to act freely as we see fit, the common sense to coexist with others wherever possible, and the courage to stand up for ourselves whenever there are real conflicts. As the movement was dying down, the faction of Occupy that was most invested in legalism and protocol called for a National Gathering in Philadelphia on July 4, 2012, at which to “collectively craft a Vision of a Democratic Future.” Barely 500 people showed from around the country, a tiny fraction of the number that had blocked ports, occupied parks, and marched in the streets. The people, as they say, had voted with their feet.
{ "pile_set_name": "OpenWebText2" }
Efficacy evaluation of two new teat dip formulations under experimental challenge. Two new teat dip formulations were evaluated against Streptococcus agalactiae and Staphylococcus aureus in half-udder, experimental challenge studies. The first product contained a combination of 1.9% linear dodecyl benzene sulfonic acid - .55% iodophor. Incidence of infection was reduced 52.7 and 70.7% for Streptococcus agalactiae and Staphylococcus aureus in dipped quarters compared to undipped controls. The second formulation was a barrier-type product consisting of milk protein solubilized with lauryl sulfate, a surface active detergent and 4.8% glycerin. Rates of infection were reduced 60.3 and 67.9% for Streptococcus agalactiae and Staphylococcus aureus.
{ "pile_set_name": "PubMed Abstracts" }
About Us Telemall Corporation is the largest telemarketing DRTV organization of Pakistan having its franchisees in 30 cities of Pakistan and outlets in various countries including U.A.E, Saudi Arabia, Bahrain, Qattar, etc. Telemall with specialization in advanced technology, excellent services and good reputation in the market, is dedicated in offering high quality products to its customers.
{ "pile_set_name": "Pile-CC" }
Supreme Court agrees to hear GOP primary funding dispute The South Carolina Supreme Court says it will hear a case that threatens to mess up South Carolina’s Republican presidential primary. In a lawsuit filed late Monday, four counties claimed the state does not have the power to run a party’s primary. At issue is a new agreement this year where the state will pay $680,000 (about half of the primary’s costs), and the GOP will pick up the rest of the tab for “legitimate” expenses. However, the state Elections Commission has not yet determined what a “legitimate expense” is. Beaufort, Chester, Greenville, and Spartanburg county officials are afraid they will not get fully reimbursed for the costs of running the election. “We have questions on what are legitimate expenses and who makes that determination,” Greenville County Elections Commission director Conway Belangia said, “We don’t have anybody involved in those discussions. The counties have been excluded from that.” All four counties are named in the lawsuit, which claims local governments should not be forced to run a private political party event. The suit also claims the South Carolina Elections Commission cannot run the primary without an explicit state law. The state GOP and Democratic parties are also named in the suit. However, the Commission and South Carolina Republican Party say the agency does have authority under two budget provisos passed by the General Assembly earlier this year that give the Commission permission to use certain funds specifically for the presidential primary. Legislators overrode a veto by Governor Nikki Haley to keep that language in the budget. Attorney General Alan Wilson backed up the agency earlier this year in a brief, saying a law passed to fund the 2008 primary could also apply in 2012. County officials are worried some expenses, such as voting machines and overtime pay for poll workers, might not be covered by the agreement. The suit estimates all 46 counties paid $966,000 in 2008 that was not reimbursed. SCGOP Executive Director Matt Moore said the party is willing to help out, but will not write blank checks. “We’re not going to pay for new computers, new roofs for buildings, and those kinds of things,” he said. Moore said the state funded both the Republican and Democratic presidential primaries for the first time in 2008 because new federal election laws made it too expensive and legally risky for the parties to do it. The Supreme Court did not schedule a hearing on the case, but said any documents are due next week. Moore said, if South Carolina loses the lawsuit, legislators have promised party officials they would change state law when they return to session next January.
{ "pile_set_name": "Pile-CC" }
August 2011: This thread badly needs to be updated/pruned. If you (yes, you!) would like to take over maintenance of this thread, please send me a PM. Members with active, helpful posting history preferred. Otherwise this thread will be unstickied at the end of the month. The FAQ Compiz Compiz is what is known as a "compositing manager." It enables your desktop to run faster than with traditional window managers, and allows you to be more productive. Compiz controls the effects you see on your desktop: Shadows, animations, "the cube," and a whole bundle of other fun effects. On Ubuntu 7.10 and up: Open System > Preferences > Appearance. Click on the Visual Effects tab. If Compiz and desktop effects are enabled, Normal, Extra, or Custom will be selected. If Compiz is disabled, None will be selected. To switch modes, simply click on another selection. Changes take effect immediately. Install the package fusion-icon and reload your session for a notification icon to switch between Compiz and the standard window manager. Beryl was merged back into the Compiz project to create what is now know as Compiz Fusion. Beryl is no longer supported or developed meaning that if there is a bug, no one will fix it. Therefore it is recommended that you use Compiz Fusion which comes installed by default in Ubuntu. Custom only appears if the package System > Preferences > Simple CompizConfig Settings Manager. only appears if the package simple-ccsm is installed. When you install simple-ccsm, a new selection will be available in Visual Effects, which allows you to customize what effects are active on your desktop. You can also customize the effects from You can also access it from System > Preferences > Advanced Desktop Effects Settings or by opening a terminal (or Alt+F2) and typing ccsm. Simple CompizConfig is just that, simple. If you are looking for more options, install the package compizconfig-settings-manager . Be sure to keep simple-ccsm installed so that the Custom option remains available in Visual Effects.You can also access it fromor by opening a terminal (or Alt+F2) and typing As of recent Ubuntu releases, these are now available in compiz-fusion-plugins-extra , which is not installed by default. See the following thread to find out why: Compiz-Check http://ubuntuforums.org/showthread.php?t=934934 Just to add, if you want to use emerald for window decorations, don't forget to type in alt+f2: Code: emerald --replace Nope! Xubuntu has it too!Just to add,, don't forget to type in alt+f2:The gtk-window-decorator cannot be controlled by Applications > Settings > Settings Manager > Window Manager since it only control xfwm4. However, you can load .cgwdtheme files through the terminal. I recommended emerald since it is really cool. This is a common mistake caused by disabling some plugins in CompizConfig Settings Manager. To fix, open the manager (System > Preferences > CompizConfig Settings Manager) and find the "Window Decorations" plugin. Check the box and you're all set. System > Preferences > Advanced Desktop Effects Settings, go to General Options, Desktop Size tab, and make sure Horizontal Virtual Size is set to 4. Go back to the main window, and enable the Desktop Cube and Rotate Cube plugins. You can "spin" the cube by pressing Ctrl+Alt+Left and Ctrl+Alt+Right, or hold Ctrl+Alt and click and drag. (Image) First, install compizconfig-settings-manager. Then, in, go to General Options, Desktop Size tab, and make sureis set to 4. Go back to the main window, and enable the Desktop Cube and Rotate Cube plugins.You can "spin" the cube by pressing Ctrl+Alt+Left and Ctrl+Alt+Right, or hold Ctrl+Alt and click and drag. Data: Beaming up in 6 nanoseconds. Press alt+f2 and type in Code: ccsm Go to Animations and on the close animation tab, click on the top animation (by default, that would be Glide 2) and press edit. Look for Beam, click ok and close. That's it! Enjoy Capt. Picard: Prepare to beam up.Data: Beaming up in 6 nanoseconds.Press alt+f2 and type in(Alternatively, go to System > Preferences > Advanced Desktop Effects Settings in GNOME)Go to Animations and on the close animation tab, click on the top animation (by default, that would be Glide 2) and press edit. Look for Beam, click ok and close. That's it! Enjoy Emerald is a replacement window decorator which supports many more effects than gtk-window-decorator, GNOME's built-in window decorator. The package To enable Emerald on login, go to System > Preferences > Sessions. Click the Add button, and type in Emerald for Name and emerald --replace for Command. Click OK and close the Sessions window. The next time you sign in, Emerald will be running. Install the emerald package from Synaptic.The package emerald-themes provides some themes to use in 8.04, but it is currently missing from the repositories. Themes must be installed manually for the time being.To enable Emerald on login, go to System > Preferences > Sessions. Click the Add button, and type infor Name andfor Command. Click OK and close the Sessions window. The next time you sign in, Emerald will be running. Themes GNOME Art GNOME-Look deviantART Themes for Kubuntu can be found at: KDE-Look deviantART Themes for Ubuntu (GNOME) can be found at:Themes for Kubuntu can be found at: Other http://ubuntuforums.org/showthread.php?t=762363 Another dock available is Cairo-dock: The dock is known as Avant Window Navigator. Instructions on how to install and configure it are available here:Another dock available is Cairo-dock: http://ubuntuforums.org/showthread.php?t=878603 System > Preferences > Synaptic Package Manager, and search for "screenlets". Install the "Applications > Accessories > Screenlets (or System > Preferences > Screenlets) and enable the screenlets that you want. There are several programs which allow you to put widgets on the desktop. The most popular is a program called Screenlets. To install it, open up, and search for "screenlets". Install the " screenlets " package that comes up by double clicking on it and clicking apply on the top bar. Once it is installed, go to(or) and enable the screenlets that you want. Gutsy: Code: deb http://ppa.launchpad.net/gilir/ubuntu gutsy main universe Code: deb http://ppa.launchpad.net/gilir/ubuntu hardy main universe Add these to your sources in System > Administration > Software Sources; Third Party Software; Add.Gutsy:HardySee http://screenlets.org/index.php/Download for additional sources. Useful Links Contributing Why doesn't Compiz start? Compiz usually won't start for the following reasons... blah blah blah blah Compiz usually won't start for the following reasons...blah blah blah blah
{ "pile_set_name": "OpenWebText2" }
The latest campaign of incitement in Israel is so extreme even the Right has condemned it. The irony? Its message is entirely in line with that of the government. A single day after right-wing Culture Minister Miri Regev proposed cutting funding to artists and cultural institutions that are “not loyal” to the State of Israel, quasi-fascist organization Im Tirzu launched a campaign to name and shame artists who support human rights and anti-occupation groups. Several weeks ago, Im Tirzu, a hyper-nationalist organization that an Israeli court ruled resembles a fascist movement, launched another campaign accusing human rights and anti-occupation activists of being foreign planted “moles.” The current campaign, an extension of the first, is being promoted under the banner “moles in [our] culture.” A number of political figures on the Right from Prime Minister Benjamin Netanyahu down to Benny Begin and Naftali Bennett condemned the campaign, with some saying they oppose it and others going much further. “The singling out of so-called traitors is an old-fashioned fascist technique that is both ugly and dangerous,” veteran yet marginalized Likud lawmaker Benny Begin said. Prime Minister Netanyahu said of the latest campaign, “[I] oppose the use of the term traitor for those who disagree with me, but at the same time oppose Breaking the Silence, which slanders Israel overseas.” Education Minister Bennett described Im Tirzu’s latest campaign as “embarrassing and unnecessary.” Im Tirzu’s tactics went too far this time. But only its tactics. The content and sentiment of its messaging are entirely in line with that of the government. When Im Tirzu first released its “moles” campaign it openly did so with the aim of shoring up support for Justice Minister Ayelet Shaked’s proposed law targeting foreign funding of human rights and anti-occupation groups. For the most part, the groups targeted by Im Tirzu are identical to those that would be affected by Shaked’s NGO funding law. (Disclosure: The non-profit that operates +972 Magazine and its Hebrew-language sister site, Local Call, was included in Im Tirzu’s “Moles” report. We would not, however, be affected by the current version of Shaked’s NGO bill.) Now the organization has timed its latest report, about cultural figures associated with human rights and anti-occupation groups, with another piece of legislation that targets artists and cultural institutions that oppose various aspects of the ruling regime. One might be tempted to applaud the leaders of Israel’s government, arguably the most right-wing in the country’s history, for condemning the McCarthyist tactics of an extra-parliamentary quasi-fascist organization. Those same leaders, however, continue to support the very policies that aim to delegitimize human rights groups as foreign agents and the artists who share their values as traitors. And that is what is happening in Israel today. There is a concerted effort by the Right, both within the government and in extra-parliamentary movements, to push the certain liberal values out of the acceptable political lexicon in Israel. By putting disproportionate focus on the foreign funding of human rights groups, these right-wing actors are saying that human rights are alien to Israel’s set of values. By threatening the funding of artists who oppose certain aspects of Israel’s regime, the government is saying that you cannot criticize the regime without consequences. By comparing the “radical left” to terrorist elements in the right-wing settler movement, the government is saying that anti-occupation activities will not be tolerated, something we saw with the draconian treatment of Ezra Nawi, Guy Butovia and Nasser Nawaj’ah in recent weeks. *** The legitimate political spaces for opposing the occupation from within Israeli society are rapidly shrinking. Opposition leader Isaac Herzog, leader of the Labor party often associated with Yitzhak Rabin’s peacemaking, declared this week that the two-state solution is not happening any time soon and has been trying to outflank Netanyahu from the right. The only remaining left-wing Zionist party in Israel, Meretz, hasn’t won more than six seats in the past 12 years. Bad things happen when there is no room for dissent in a country’s politics. The opposition becomes weaker, the regime feels entitled enough to institute a tyranny of the majority (something Palestinians have fallen victim to since day one of Israel’s democracy), and political opponents become dissidents. Those on the Right delegitimizing and ostracizing the home-grown “foreign moles” fighting the occupation are actually creating a self-fulfilling prophecy. For if it manages to eliminate the anti-occupation movement within Israeli politics and society, the world will stop deluding itself into believing that there’s a chance Israel can correct its own tragic trajectory. And when that happens, it’s a whole other game. Update: The following video of Prime Minister Benjamin Netanyahu making a fundraising pitch for Im Tirzu in 2012 has been circulating on social media today.
{ "pile_set_name": "OpenWebText2" }
Use of human-milk fucosyltransferase in the chemoenzymic synthesis of analogues of the sialyl Lewis(a) and sialyl Lewis(x) tetrasaccharides modified at the C-2 position of the reducing unit. Two series of trisaccharides, having the formulas alpha-Neu5Ac-(2-->3)-beta-D-Gal-(1-->4)-beta-D-GlcZ-OR and alpha-Neu5Ac-(2-->3)-beta-D-Gal-(1-->3)-beta-D-GlcZ-OR [R = (CH2)8CO2CH3] respectively, in which the 2-deoxy substituent Z is azido, amino, propionamido, or acetamido, were prepared by chemical synthesis. Both types of modified trisaccharides are acceptors for a fucosyltransferase preparation obtained from human milk. Preparative fucosylations using this enzyme provided analogues of the sialyl Lewis(x) and sialyl Lewis(a) tetrasaccharide structures, which have been proposed to be ligands for cell-adhesion molecules. These syntheses further demonstrate the utility of glycosyltransferases in the preparation of oligosaccharide analogues.
{ "pile_set_name": "PubMed Abstracts" }
Image and text provided by University of Hawaii at Manoa; Honolulu, HI TUESDAY, MARCH 19, i : 1918.'JRAWAIIAJJ -GAZETTF.SEMI-WEEKLY,3r.'l. IV,-i-,I.-1 'iiiis iihiiijnciiv oruiwKaiser and' Army Lprtis Would' immediately , Annex Baltic' Provinces But Government andReichstag Would TemporizeCAUCASUS WUaTrEFUSETO RECOGNIZE TREATYObject's To SiirVder of landsand Wiir Deal With Turkey Oi' rect To SecufS. Peace TermsThat Are More AcceptableWASHINGTON. March 16(Associated Press) Already, the day following the ratificatioii of the Brest-Utovsk treaty by the A II -.Russian congress ofSoviets at Moscdto various actions in (icrruany arc quarrelingover the disposition of the plunder obtained through the treaty,the great Baltic provinces. This i. told in an official despatch issuedfrom here last night., WANT ANNEXATIONSerious differences between tingovernment and the general staffhave arisen in Berlin, is the information upon which this despatch "was based. The KaUnhimself., von Hindenburg and vorHertfing are demanding the immediate annexation of that country which is relinquished by Rus.sia under the treaty. The government is inclined to temporizeIn this the majority of the rciclistag are with the government aiu'the socialists are claiming thpeople of the provinces should bgiven a voice in the deciding o:. their own dextiny.CAUCASUS OBJECTSThe Caucasus declines to rccogttize the Brest-I.ttovsk treatydespatches from I'ctrngrad las'night announced. Its governmen'has issued a statement refusingto endorse the treaty and the surrender of Kars. Bartmim amArdahan to Turkey asserting thait has a right to negotiate its owrtreaty and no other has a right tnegotiate for it. The statementsavs the Caucasus will deal witlTurkey direct and is now sendinga peace delegation to Trebizont:to negotiate for such a eace.UKRAINE OPERATIONSth the Ukraine military operations are still proceeding an'Bachmach, nortlna-t of Kiev, liarbeen, occupied. A Vienna despatch received in Amsterdam saithat negotiations f' r peace between the Ukraine and Kussi;have been opined at Kiev amthat if these be successful military operations in that sectiot: -Will sjieedily endN'tgotiat ions are progressingfavorablv for a reconciliation between ('icrtnanv and Poland, theWarsaw Kurjur PoNky is reirted to have announced, accordingtotJther despatches from Amsterdam. It asserts that a "new solutlon of the Polish situation is ttic announced shortly".''.Tne men emplov ed in the workfcnonS ol trie Austrian rtnlwavsTi'aAe gone on stride, refusing tobey military orders. The strikeare spreading to other factoriesCope'u''h'ageti despatches said.. seiw!LENTER ON PEACE PACTBEB" . Mari-h I "! i AMHocintedI'resSf-rldH utill hIiiiiiIh fur carryIIB nt the w i r iijaint the Teutons,pnf'ordhljf o well informed sourceaThe TtnaMi Jtiiiiiiiuiiin i.i'Hi e hus notfhanilwi Herhiii H nttitudc. A jjronolaent' diplomatist nv that the rumorstVt Serbia would make a sepnratfeacs ere untrue 1 Ik- I nit million ofv Inhabitant" t.ll persevere in theLEADING FINANClEkNEW YORK HOMEMOW YORK, Msrch'lV--( AssociatedPress) James Stillmnn, banker and oneof the leader in (lh worKl of finance,chairman of the boariT -'director" ofthe National CHy .Baikpf SeM-Ark,director in many other iusins 4uterprise iim lulling the Western I'nionTelegraph ('omonhy Mil' .number ofrailroads, died of heart disease at hishome on F.nst Seventy -second Streetlast evening.In the financial section of the NewYork Herald the following brief nkelrhof the )freat banker and leading flnancier uppeared only a few weeka o:Jamee Ht ill man, who habaen artivein Wall Htroet ainre the early '70 ,who known the gam of flnanre iu a (uperlative degree; who, like all nigmen. bna made many enemies and multittidcd of friends, aad who ilolighta intoth, in a Texas by accident. liereally coinea of Revolutionary "took,tiut in father aad Mother happened tolie viHiting iu Galveston,. Texan, Janua ry 9, ISiO, and thoir, sou finhracedthe oortunity to be born tlvere.When he was old enough to read thelrlorious history of the Lone StnrState's mairnifli'OBt fight for indsiK-u.deuce he was ilelightail at hi tore-tight in hcx-oming a Tetan. Ten himnlwaVH lieen proud of it, too. An thin Ii (.imply tho briefest possible sketch (of Mi1. Htillnisn and his csreer in the 'rinanrial world, it mar lie ae well toRAIDS BY ALLIESKEEPONFrench Retake Trenche LostTwo Weeks Ago. CanadiansRaid Sector and German RaidRepulsed American Casualties HeavyNEW YORK, March 16 ( AssociatedI'res routinuiug thevolley of keepng the (ierfliana on the Weictern frontio thoroughly occupied that they haveit tit opportunity to launch theirlire.-iteneil drive. Severn! Hiii-i-e.sHfulnida were undertaken liy the British 'm l Krenrh forces yesterday while nirii i I h and air encounters went forward.igorously. ..","..In the ('hampagna aec4oV two attacksiy the French are reported. An otTicial 'onimuuique from Pari lost night HailKrem-h forces regained a sector ofriMii hes near Moute f'arnillet which Ihe GennauH occupied on March and Itad ever since held. In this encounter -heytook forty-two prisoners and se- jtired two machine guua as their booty.The engagement closed with hand to ian.) lighting and several hundred Uer- Inans are reported to have been killed.Mie other French engagements was on ,he road west of Norcy where the j'rencH succeeded iu securing and reaming a foot hold in a small sector,'anadlans Make RaidIn the Lens sector, Loudon reported,Canadian troops made a successful raidin a Teuton position and took fourteeu iprisoners.Near i'asehendaele Of rinau forces attempted a raid but met with completeailure and suffereil considerable losses 'n their fruitlesn attack.Air Fleets BusyTremendous air liattlare takingiilaoe on the western trout, as the Tenoils ami the Allies struggle for airlupreniacy preliminary to the greatiffeasive which are expected.Witbiu the la si iweuty four hourshe British flyers have accounted forwen ty-four German planes. Five , ofhe British rliera are missing.Seven hundred lioiulis have beentrapped by the British on euemy bilUts, amniuiiition dimipx, aud railways.The Courtrai Ueniaiu railway haa beenme of the lurgets for the BritishHimbers.iattle In TurkestanNews comes from Turkestan of Moodvutiles fought there lietween the Soviettdhereuts uud the Turkestan natives,be caxuulties reaching lit 1,0111).leavy American LossesThe American uunualty lint receivedroiu General 1'ci'ahiiig at the war tielartment wan the longest yet. Jt williot be available in full Ik-fore tonight.,1'ouj'tei'u Americans arc dead and 4Hvouniied. 8ix coinuiissioued officers areimong the caMiialtics. They arci Lieut.tichiird Whitney, dead; Lieuta. LouisSV. Rons, John V. Appersou, William H.rjledeoe, (iiuuville M- iiurrow and William (J. PaUuey, wounded. ,Preparatinus on ttie part of Germanyto speedily launch the much advertisedand long delayed drive on tbe westernfront were told yeatuiday io (U'Apatohetfrom Amsterdam. Ueneral von iHindetiburg, in h i intcniew gives out byhim in Bcrl i i, p - ed as saying;"The Kui.nl powers have ahowam uniespnnsiv e attitude toward Otroaiiy's peace iateutious," he eaW'and the grcut otTcnnive must go on."Well iufiimiud otbriuls is neutral(uartc'rH recent Iy f told the AssociatedPress that (Jeruiauy iu prepared to lose:iOO,000 men to inaKe the blow on theest effective.Chief of .staff von l.udcuburg is aleeincited as saying "tbe euoaiy is welvouie tp attack. They will ftnd Geraiaay is ready." (icrmnny iow fljjlms,(iesi despatrliin said, to be atroiUfe-'in oisn power, gnu power aud munitions und supplies tlinn are the AUisW. 8 .The I'earl Hurl. or unval station itvery much hi need of experieuced foremen for handling section (nags .In theconstruction and maintenance of railrriml tracks in tins nrd.COLDS CAUSE hemcuesLAXATIVE BROMO O.UrNR removes tbe cuse. Used the world overto cure a cold In one day. Tby sLQUiie of H W. CKUVti i tu at& besMsuulurturtd by the i AKIS MEJJCINB CO.. St. Louis. U. S A.mmDIES AT HISOF mearv troubleWany that b has bee and ia a dlrecor trustee Or chairman or cresident ofmany baukvtrijt ccuupanlea, Insurance,1X&ZX'?:;that: for to giv tha list Id full wool. Ihe like publishing goodly Used financial directory., vBriefly, ha VM partner la the Armof Smith, Woodward A. Stll.man from1171 to 187S, had has sine thea bean apartner of the aneceodlng firm of Woodward It Stillmaa, oottoa ' eowiiaiimionmorchaata. ' Aad ia 1891 he waa electedpresident of the National hty Bank,which position he beki until he reeignedin January, 1009. Now he la the chairman of the bank's Board. rf Directors.lie ia a member of sixteen club amilias si ways been .considered .one of theIwaL groomed men la Wall Street.But Mr., Btlllman la something faritreoter than a financial power And manof affaire, for ainoe the war haa beenravaging .the world .fee haa doae muchtoward paying back to fraace the greatdebt .owing her staauae of Lafayette.He haa gv.n nUlmna of francs to thefatherless cfilWrea of member of theLegion,, oi Honor, there, has .worked.I naru to . rsuava .fTvitcn ..war oryuanaad the .widows of French soldiers, andhas given a great faria .residence overto honpital work and maintained it.He haa done much mors than that, but,the lint of,h4 charities must be curtailed here even as has been that pf hisfinancial activities. . 'JAPAN HEARS HERCITIZENSARENewV of uutrage By RussianMaximalists Fellows Closely OriThat Peace Trfeaty and MaySpeed txpeditionary ForceTOKIO, KafcavtrBpaolal toHawaii Bhiopo) BOsslaa llaximallita today 'atanghtetefi onehundred and fifty Japaneae atBlaroreatchenak t in tha Amarprovince on tha Zeya River wheretho Japanese were Employed tnand about the gold mine and intha ahlp building yards.Annoancenjent of tho news ofthis ontraga, corning at almost thosame time aa tha annotracementof tho ftrraomant of tho AJl-Rns-siantori eta o accept the peacetwtm offorod by Grormaay haaroused a greater fooling than everia favor of mobilising and aandtng a largo expeditionary forceinto Siberia aa speed. Iy aa poaalble. . . Demands for Immediate reprisals vgaiaat the MaxlmaUats arefreely irolcod. and tha aontimontttarimti. that Japan isnat takeadequate ' step to protect tholives of tta subjects.S-NO ASSISTANCE CANBE EXTENDED JAPANLONDON, March 16 (AssociateiPress) Denial ef the report issuedseme days ago that Prince Lvoff hadostabllshed a "Far Kastern Bnaaiaagovernment ' ' was received from Poking in a Reuter's agency despatch re;reive.) last niirht. The desnafarh aavtjj,, previous report was unfounded an 4probably referred to a eonresencewhich waa held by a number of prominent Russians in Peking in February.This conference was attended by thoBossian minister to China, Prince Kudacheff. The receipt of this message .banishes the hope of Japan securing any direct and organised support from th.Russians if that country shall send an,expedition into Siberia as it seems likely it will be found necessary to dosince the Brest Litovsk peace treatywan continued by the Russian congressat Moscow. 'It has developed that the ineasagof sympathy which was sent by President Wilson to tbe people of Russiathrough tbe Soviets was received twday before the opening of the aoaaioat Moscow aud su had not the effectthat prescutatiou might have had onthe day the treaty was considered.. M. Bysuinev, noted Bolsheviki .andalso representative in the Moscow oongsesa of syviets of all the professionalunions, has announced his. resignationfrom the Bolsheviki, l'etrograid despatches said.W. 8 8.FRANCE IS SAVING ALLEGAS0L1NPA It I M, March 10 - ( Associated Press)Numbri less warnings having provedineffective, Premier Ciemenceau hataken mure urgent steps to prevent government einplnves from wasting gasoline on pi t-oiimI or unnecessary automotile trips. He has given nn earnest ofwhat univ be e spec ted by decreeingthat tbe diirctor of the agriculturalservice vvlm use. I a machine for a tour,must pav nut i.f Ins n n pocket for tie"essence'' used ami the near and tearto the ti rcilt is even claimed that chiefs ef dopertinents, having automobiles at theirdisnosal. have sent the machines outduring U iui hours in searc.h. of oigrarettes and other private errand, usingup, as one Paris newspaper sarcasticallyremarks, thirty litres of gasoline in order that the chiefs ' messengers mayfind one package of tobacco.W. 8 8.RUMANIAN CABINET OUTWASHINGTON'. March 15 (Assoelated Press i - The department ofsln'e hns dv ii-i's that the Rumania ocabinet undei ! n-mier Averfsen has-ii'ne.l hi.. I tin. i M a r(,liisiaoii Is a.aking up a in IV nut'AMPLE AIRprotectionIS PROMISED') i v ' mUnited States To HaveEnough AmericanBuiltPJdiicistnFranceBy JiilyWASHINatON, Xarch la (Associated Press) On tie highest authority it ran be said that 'J' enough American .unit elrplaaeY will -be in Franceby July . next to Insure, the American'orces of protection , In whatever andn as many sectors as they may thenIje occupying. Yt This hseertion wasmade by Urowoll yesterday wnen nelaid before the house cifnmittee onnilitary affairs' a wase of data Ujionnvlatlon, at eraft buih and building'adlities for . such work at hand foi'he (overnuient and many other deails. His report was received with nhigh degree of satisfaction.Last month there were publishednumber of articles In various now-Hiispern to the effect that the flermani.were in eontfo-l of the air at the pointsvhere tho United States soldiers wereiccuuying positions. On this subjectSake- was at first silent and army offiers were similarly retieont. Neitheronflrination nor denial was at thatime ofiiciallv ffivon.latcr it waa atate.l that France nnd'mat Britain had, early iu the firstlays of the United Btatcs entry intohe war that they would be able tournish adequate aircraft protectionantil the United States was in the posiion to do this for itself. It was alsominted out that aviation experts hadid vised the use of tho types of mahi nos then in one by the Allies andvhich had proved their usefulness andhe United State should use its output,if aircraft, at leant until somethingequally good had been perfected, foitraining purposes only.The house 'committee was told howuanv American built planes were novu use at tho traiuing camp and whanieces has been achieved with th.Liberty Motor'. in applying it to aviation.Secretary Lane Asks PresidenTo Support Measure ToIncrease Efficiencyi WASHINGTON. March 16 (Associated- Press) Tunds are sought for theconduct of a1 eamnuiirn acainst illiteracy, and Secretary Lane of the department of interior has written to tnePresident askina h m to lend his supDort to a measure which is to be introduced to provide sufficient fund furthe "bureau of education.Secretary Lane pointed out in hitletter to Wilson that it has beea fonndthat in the first draft there were ineluded more than. 30,000 young menwho were illiterate. He said the firststep taken when funds are made availabb) would be to reacb those youngmen. The next step will be to reacheligible among the registrants beforethey are finally drafted into tne army.Lane urges his measure as one necessary to produce efficiency both amongthose io tbe army aud those who aredoias other necessary war work andwhom it is also designed to meet.w. a. a.GE!AT ENGLAND'S HEARSir Eric Geddes Urges Enlistment In Needed ServicesBRISTOL, March 16 (AssociatedPress) All British subject of fiftyyears of age or under were urged bySir Kric (ieddes to enter into somesort of service in the defense of theicouutry whether it be in actual military service, ammunition manufactureor other pursuit which is absolutelyossential to the winning of the war,He made an earnest appeal in a speechhere yetserday.Sir Kric declared that "undoubtedIy Germany will ftrike at the verheart of airland. What are yoa fioisia-vour country s defense nowi nnswill vou do theuf" he asked. lie saidthe time hail come when his hearersmost decide how they could beat helIn the conduct Of the war and thateach man must exMct to bear his paIn tbe necessary work.W. S. .STEVENBECOMES COD fISHERhT:.TTI.K, March 16 ( AssociatedPress; ( apt. H. O. Wick has purchased the schooner i'asen, once usedby Robert louls Stveu-on for biscruises iu the South Boas. This famousOld schooner is oow to go into thefishing, industry. Cnptain Wick saidyesterday he would sail in the Oaaco toAlaska tin end flshiug voyages.v. a. . - -VESSELS IN COLLISION;TWE'NTY-SIX MISSINGLONDON, Knglaad, March 15 (As... , . Iu.wiHf.iil I'ri'ftn 1 rweillV-SIX lieome rr,.;;.;,i,r ufu r a ' Collision between" ' . ,naval vchmcI mid the HrWlsb ""'Hathiiioic, off the Irish coast.FIGHT 1LUTERACVSON'S CASCO1YLIGI T SAVIiiG" "LLIS PASSEDNational, Chamber, of CommerceGives Fifty-two ReasonsWhy It Should Be LawWASfltjiOTON, March 18 U.soclated Pre) Th Daylight taring Billwe passed by th hona of represent-ves Vesterdav. Pravlonalv it had beenpassed by. fhe sen at find now goes tohe President for approval. It ipeeled as will Sl(Jn it at aa early date.Tne bin a it a passed both housespplie to the United tttatet mainlandmt not to it Paeitle Ocean possessions.ft 1 to beeome.effertive.at two o'clock. m ."pa the twentieth day after tbeMmVhl of the act y the President.t that time th clock In each timeqn of tho eountry will be yet forwardne nour.fifty-two BoaaontFifty-two important reasons for th!ttrompt passing of the Daylight Savingfill were given to congress, la vie reort of the committee on Daylight Havng of the United State Chamber of.wnsiprre.Expediting the training of the aaiowal fntoes. speeding . , up the protaction of the plant making war ratrial, iacrrastnff the production of tbeihinbnilrlinc yard theae are three im.nediat results of the daylight savingneasure emnhasuied a most importantfrom wiMtnry point of view.The sabstitntifra of a work hour athe Wffissing M the workinr day fora dark hour of artificial light at theend of tbe day brings advantages thatare solf-evwient in th mere statementeontinae the report. It will reHevrhe strain at tho time of greatest fati7ne. Improve working conditions, parHealfrrlv In Industrie whet accurateeyesight Is essentlnl, and materially cutdown te number -of rndostrrsl sectflentw which, as statistics show, have oc'urred most fronuently in the late njernonn. wnen Tinmsn eiricteniTy is ainw er.h: also these is lessened risk oflectdeirts in transportation and, local'ramc risnnitng. nv moving tne arterifton ru-h forward into daylight.All along tbe line dnyttrht savinsmean Increased ffReiencv rn the imnrnvement of th health, morals andsocial we'far of the twenty millionwerkers of the country. Working girl-will go home bv daylight. Pnr"r winswe a new hour to snend with their-hildren. , Wills for gas and electricMiirht will be cut down, and outdooreereaMmi will he atimnlnted. ThnosslHle Increased gardening production'hrouyh daylight saving is also a conideration.Saving of Xlgnt nd HeatDaylight saving means also an immediate reduction in the use of lightand heatj With its attendant eonservalion of coal, Mora than 1,500,000 tonsof eoal a year is tbe estimated savingeven if the measure is In effect onlyfor the shortest period that has beensuggested; and the saving in fuel oilis equally impressive, t . '. ''The savings would occur in both direct and indirest ways. The amount,of coal that will be saved if the clock'is moved ahead one hour would differwith tbe method ia which daylightsaving is used. Calculations computed for different periods, based .uponthe actual British experience In thesummer of 191(1, and modified by allow.,"nee for differences in latitude, give thefollowing savings in eoal for tbe United States:(11 Saving of 150 tioiirs of a yearlyaverage of l,.'t'J0 per year requiring artificial illumination in the V. S. i.e.hv daylight saving between second Sunday in April and last Sunday in Sepmber: In electricity for lighting. 6rti100 tons: in gas for lighting, 144,000tons. Total, K04 000 tons.(2) Saving of 190 hours from theyearly average (i.e., with clocksmoved ahead one hour between April1 and November .'10t; In electricityfor lighting, 8:1(1.000 tons; in gasfor lighting, IH.1,000 tons. Total, 1,019,000 tons.(:t) Saving of 198 hours from theyearly average (i.e., with clocks advanced one hour throughout year): Inelectricity for lighting, 871,000 tons;in gas for lighting, 190,000 tons. Total,1,0(11,000 tous.The saving iu coal ured for thesepurposes could lie represented approximately by the following percentages:(I)' With snviug of 150 hours;Amount of coal used for lightingthrough gas and electricity, approximatelv . 15,750,0(10 tons; amount .saved,804,000 tons; percentage saved, 5 percent. (t) With saving of 190 hours:Amount of coal used for lightingthrough gas and electricity, approximately, 15,7150,000 tons; amount saved.1.019,00(1 tons; percentage saved, 6.5percent.(:i) With saving of 168 hoursAuiuunt of coal used for lightingthrough gas and electricity, auproximatelv, 15,750,000 tons: amount saved,1,0(11,000 tons; percentage suved, 6.6percent.A Notable .ExampleTbHM figures do not iucluds tbesaving which would be obtained at isoluted plants and at elentric. powerplant which sell power for lightingTo be borne in mind too is th factthat the estimate has been made on abasis which assumes that the use ofelectric energy and gas for lighting isspread evenly over the country, whereas as a mutter of fact 57,000,000 electrie lights out of a total df 76,000,001in the country are in Mew England.Middle Atlantic nnd Northern OeutralXtatcs, where the advautagra of daylight saving will be most striking.The saving of coal through substitutiou of a morning hour of moderate,'illuminutiou for an evening hour ofmaximum use of electricity aud gasliuht saving will do two very Import-int savings in coal would be obtainedh'.r example, tnjin the CommonwealthIvIiMop Quniiany of Chicago. The- Phload of this company is needed forno more than one and a half hourdav. The average load ia les tlisiil AC... . .. , .. . . ,i.. l rriu. 1 I"nr 'rirciu nir iit-nii. -"ment and equipment to produce theI penk Is upward of niie-f uitn or tutI whole," nn.l equals fJ.-i.ttUNIMI. Dayligih saving vvil do two very lmporKills SellBecause"Wife Refuses' To Befiiurder-Plut Dticbypv.: A .'V'So Widow of Mike IMer, KemooHerdsman, Testifies Wheji,$lVeTells How Her HusbandPlanned To. Slay $oldierRefusal to aci ai a' decoy 'to get TrrsU Bald win, Company L Tlrit Infaatry, into a secluded aiiot In tho" glilehbelow the BTemoo, Farm, wear SctofleMItarraeks, whero he coitld be Shot byher hosba&d ia ascribed by Mrs.Minnie Miller, as the only eaooeof domewtie AeestUes between .herselfand Mike Mlltor, the herdamaa whoommitted uicide laet Monday moraing.Such was the atain subataaee of bettestimony given at coroner's Inqnestheld yestefaay, aeeordlntt w h temnhana renart caealirsd . from DenutVr - - . - r -, - - -. -. k am f , i. , TY ai 7-- ' Sw-lIlLBo conducted the Investiirstton. Thtorpner Jury ' returned a verdict ofSuicide. - ' 'Mrs. Miller, who .until her marriageoo February 22. was .Miu.Jdeyers, adaughter or lapt. Robert I'araerwas the chief wHnes it the inqnestMuch of her testimony era ourroboratey Vy k Mrs. Brown nd Mia Wannof Honolulu, .... ., , , , ... ,Evidence given at the Inquest tendedto trrove that Mr. "Mirier Ttr4 met Prbvate Bsldwia only two time mad thatshe and. her husband had had no senpus trouble during their three week ofmarried, life. , . , ' ,It was on Ike morninir of his suicide.when he, killed ne)f with a revolverwhich he, ha4 been, enryying tn hlioothe soldier, against whom he had takean insano ,and.. jealoua hatred, ne proto her that she lead Private Baldwin into; the guhi where he eoqld shootthe -enlisted ma and avoid detectionMrs. Miller testified, in effect. .Mrs.. Miller ,was intcnaing to leavefor Honolulu and hex hnaband euggeeted the plan ,to her on Monday morningnpfl jravovheir onfil her fel;urti fronjtown to make up her Mind to do as henaked, she aaid.The widow of the suicide testifiedthat aha hrttW TSftised to be a tsSTtT tsuch a foolhardy plan and so told herhusband. A few minutes after she aiso he shot . himself through the head.Miller t the time of his suicide ifsupppsed to have been sunering Tromtemporary Insanity, aecoming iouty Sheriff rlemer. There was ooiurndivntired at the innuest to snlistantiatfthe report that (Serroan hatred of theAmerican loldier was Miller's chiefreaaon for wanfing to kill PrivateRaldwin. the Waialua .deputy sherisavs."Tner was nt.ttimg snoin iirinmiifor Oermnn activities brought out at thrtnmieat. ether than that Miller wasborn in Gej-mnny," Plcmer explainedwhea questioned. ,.WILL TEACHTOkuerr in8the demand oAMEBrCAX-S0LOICTSLJn.t;(1 Stci andiGaiPA Wis. March 1 VAssoVlatid Press)Ifenorauee of .Trench, Which, balieeaa souroe of .many difficulties for theAmerican Soldier's i Pavi and otheicities, is thel subject of attention fron. , ' ! .k . If j . V..a, new rrenen sociexy , me awe rmusise a ITCtran-er. whieli is nrcaniwncn band ef volunteer interpreters, guidemd nUn a. flqmpreqeuai,ve system offree instruction. On ,tne .founderis MW, Pointaire, wife of the Frenchpresident. , , ,; w. a. O-TO -PECONSTFUCT RUINSMEXICO CITY. March 16 f Associated Press) The "ruins of Mftla, 'whii;)are situated in the Tlncolula district oftoo slate, oi v.raj(aca ana wqicn qnve ai.racted much .scientific attentton;, 'artp tie recontruiCteq by tb,e gojyepment.Tiee striking jnoitumen'tf of an ancientivilir'sjfon have een 'livqieetqrl t)y Pasor B'ouia. Mijiister ( of ment'o,Ivll erigineer, w-'lio 'has jirepnred 'a renort on the cost and means of recbndrnction.W. sDOWtUS VI UN tLANtWSJUNGTQM, ""ruh, IT'--(Assoelated Proas) Ve'ws has been receivehere that Paul Baer f Kort Wnynr-Indiana, with the Lafayette Flyin;Squadron iu France, has shot down(Vrwan -aeroplane. ..tant tlruucs for tbU and aim liar compauies. First, it will materially reduceLhe uhaU load vetiuieerl far rloaiastie Iand industrial lighting; second, it .willrT tr nsJrt r fT Mhours of natural light in plane of hav-tug it aiinultemcoua with the high leniands for artificial light, as it ia under present eonditions during manymonth of, the year.- In addition to. a .earing of voalamuuuting .to. buudreds of thousandspf ton, daylight snviiig, jf ill bo enable these vouipauios -to, ppatpooe nowinveaeiiient in quipuusn't to cary thepeak of the load, which would amountto millions uf dpllars. Thia postjioaemeut will come at a time whan, it isat the highest pjibHp iutercst to.avo:dall new financing that is 'possible. T1916 the tvuiiiiqouwaltb fdispn Coinpany had a 'generating Wuaoiiy, of:i60,000 kilowatts; at tb epd of )thud increased this to 452,680; and acordinal to plans made it, underiieoseat coudilops, ha'vw 'tq raise this t600,000 kilowatts by the ftqd of 1919.Such growth is not abnormal, andnay be said to "be typical of scoresof similar companies throughput thcountry.w. a. a. -A TAMELY KEOBSSrTT.Kvery family should be provldeil with'hnniberluin 's Pain Balm nt all times.' '.iIhh mav be cured In iiim-h less timewhen promptly treated. I,ame back,lame shoulder pal us in the side andchest and rheuaiatie pains are Some ofthe diseases for which It is especiallyvaluable. -Trysthi liniment and becomeacquainted with Its qualities aud -youivlll never wish to be without it. For.ale by all dim leys. Beaaun HuutbCo., Ltd., agent for Hawaii. Advt.Demand : Counter, Measures BeTaken Against Honana it naiCountry Acquiesce In DemandsMade 4Jpoti It For VesselsSEE DEFEAT AttEADivFORuSUBMARINE CAMPAIGNl Vessefs jArpveVlVrith-out consent of aetnenanas imirrediate RerisaJs From AUfesWonld Be Sodght -LONDON, MarcJi .lW(Asoaled Press) Throughoutthe Gernian Empire the press ofthe ou,itry in a ipwering rageat tlie tiJUmatum vvurch has beenpresented to .stib Nethcrlaarls bythe United States and Great Britain relative io tbe use of Dutchmerchant shipping in the 6ubma-nne danger xonet is reported nythe correspondent of, the Exchange Ttpgraph Service at Copenhagen. Comment on the ultimatum is. general and very bitter,he says. ,DEMAND REPRISALSFirst the German press takesexception to the offer of the United States to furnish grain in rctirn for shf'PFm8 now lying idle:n the ports of the United Statesjvith the pfoviso that such shiping may be used where tbx Uni'cd Stat es "and Gr eat Britain mayequirc. They demand that Holand shall reject tin's proposal'orthwitTv .and, declare that tovicjd to it w,ij,lj.e a breach tif ncuLrality with Germany. If theNetherlands government, shall ac-of theritaintiey demand that -the-German;6vernment 'take the most drastic counter measures against Holland.FORSEE DEFEATIt comes clearly home to theGermans through the press articles that the taking over of a million ton's, of Dutch shipping byhe United States and Great Britain will Undo a great part oflich success as Germany lias wonby means of its unrestricted submarine policy. They also pointout that if the Allies do this i;i.he case of Holland there is nothing to prevent their taking overmd compensating the owners the.hips of Denmark, Norway andSweden in the same, way. Theyall tile ultimatum little short ofi declaration of war against theneutrals of Northern 'Kurope andtrge them to stand united againstiiuh "aggressions and compulsion". If tlie 'Net'lierWds 'uhall notJ willingly acquiesce tbe pfejis -de-M quiring d tighten-ng up oi tne sunmaruic wiui.iv.iiicjvliich they claim has been cstabished. w. I 8.tviftjm-Twp. AKt COST IN PECEMBERt6H DOS, M.arch 16'-(Associated;css The )ern0 Xfitf'fi'f"",'ni "fHie irgenria Libera JitlirtrV, sfys the"leutral News, that during Des-emberwenty two Ocrinan submarines failedo rtturp to their basos.In order to counteract the alarmvhich tbi fart haircftainiicd in navalircles, the fierman. Admiralty issued utatnment sayisg moat of the .'missingiiiboiarines were sent to operate In dis's,ut waters, andnhopcH ace entertainedthat they will retnrnr .w, a. s.GUARDfTTOOKHOl M, March 15--(d',t'rnss) Home Americsiis re plavlug an OcJiMc nart with thr .. Kiroish"sed guards,' iircorditig to qews he'eIt Is sab) that the rnmpiajio'cr in chiefof these red- guards, a man named vt'eley, :with his father, fied to Aniertertfrom Finland and lived in the I'nitelStatsMi for severttin years 'o avi ILniprisonaieiit br'the Kus-iau ..o,,,,ities for the cirruliitiou nf ae. litmusiitorutuic.MEBlCAris,WEKTrVE1N FINLAND RED
{ "pile_set_name": "Pile-CC" }
Pornstars: Kennedy Leigh (aka FTV Kennedy, Kenedy Liegh, Kennedi Leygh), Johnny Sins Brazzers Network – DoctorAdventures: Kennedy Leigh is a diehard fan of football star Johnny Sins. When she finds out he’s injured himself, she concocts a plan to get herself into his hospital room to confess her love for him! Johnny may see right through her nurse disguise, but he’s not about to pass us some free teen sex! HDPORNFLIX is a Mobile-Friendly, Free HD PORNO tube,where you online watch Only FULL LENGTH PORN videos in 720p HD! The High Quality Resolution on HDPORNFLIX is Adjustable, so the free HD PORN videos available on 720p HD, 480p SD, 360p & 240p old mobile! Nothing aggressive JunkPopups! HDPORNFLIX allows Unlimited, high speed FREE PORN DOWNLOADS on Mobile-Chrome or Desktop-Firefox, without Sign Up! So HDPORNFLIX is a Full Free HD PORNO Site!It's rare, we know! Offering you the most exclusive streamable FREE XXX HD Porn videos on the web!HDPORNFLIX.ORG features daily updates with the sexiest pornstars across the hottest networks and sites on the net. This website contains age-restricted materials.If you are under the age of 18 years, or under the age of majority in the location from where you are accessing this website you do not have authorization or permission to enter this website or access any of its materials.If you are over the age of 18 years or over the age of majority in the location from where you are accessing this website by entering the website you hereby agree to comply with all the Terms of Services.You also acknowledge and agree that you are not offended by nudity and explicit depictions of sexual activity.By clicking on the "Enter" button, and by entering this website you agree with all the above and certify under penalty of perjury that you are an adult.
{ "pile_set_name": "Pile-CC" }
So here we are. The day has arrived, and it seems no more believable than it did in the wee hours of Nov. 9 that Donald Trump is going to be the president, but he is. It’s fair to say that it’s a moment unlike any this country has ever faced. We’ve elected crooks and liars and incompetents and alcoholics. But there’s something I don’t think we’ve ever done, until now. I don’t think we’ve ever had a president who seems not to care at all about the institutions of our government. He may care, I suppose, deep down, in some corner of his soul that stands as-yet unrevealed to us. But presidential campaigns are grueling, raw affairs; such passions are usually exposed at one point or another. In the 17 months since Trump announced his candidacy, though, he’s said nothing that I can recall that expresses the slightest reverence for our institutions or our system. When he has spoken of our institutions or traditions, it’s been to disparage them or to display his ignorance and indifference to them. He cited a section of the Constitution that doesn’t exist. He called our government a “swamp.” He disparaged the military and intelligence services. He said the election would be legitimate—if and only if he won. This is new. Mitt Romney didn’t say the election would be legitimate only if he won (and to those who would counter that Trump was “joking,” I ask you to consider what Trump would have said if Hillary Clinton had won the electoral tally but lost the popular vote by 3 million). John McCain didn’t call the government a swamp. George W. Bush may not have been a constitutional lawyer, but I dare say he probably read the document once or twice anyway. I’m not favorably inclined toward any of these men ideologically, and in their times, I wrote very critically of them. But I wrote critically of their ideological positions. I thought their ideas about what the Department of Justice should do or how the Fourteenth Amendment should be interpreted were anathema. With the new president, though, the argument is something different. He thinks the Department of Justice and the Fourteenth Amendment should serve one thing: Trump. That’s it. He has no theories about them. Surely no American is naïve or self-deluding enough to think that Trump has ever read a book about the Department of Justice or the Fourteenth Amendment. It’s doubtful he’s ever read a newspaper article about either. They, and all our laws and branches of government, have no meaning to him, except, now, as instruments that can serve Trump. That’s what makes this different. Trump has no belief system that fits into the existing American political schema in any logical way. He has no ideas. The idea that he adopted, the one that won him the presidency, about workers and trade, is just something he picked up and pounced on when he saw that it could help him. He saw three things. He saw that Bernie Sanders had lit a prairie fire on the issue; he saw that Hillary could be boxed into a corner on it, since she’d been for free trade; and, crucially, he saw that he could bend the ninnies in his party—that is, his new party, to which he has no actual loyalty—to his will. Reince Priebus chief among them, but almost everyone. One thing he’s not is stupid about seeing openings; it’s how he’s survived bankruptcies that would have put lesser men—no, better men; think about that—in the poor house or in jail. He was right about all three things, and it was these three hunches that won him the White House. But he doesn’t actually care about them. He embraced them because they helped Trump. When the day comes that they don’t help Trump, he’ll toss them aside. This is what we are dealing with, and this is what’s new: A president—a president!—with no belief system. This will mean, fellow liberal, that he’ll do something you like once in a while, when he hasn’t just farmed the decision out to the Heritage Foundation because he doesn’t give a crap. He might wake up one day in 2018, with Jared and Ivanka whispering in his ear about poll numbers, and decide the minimum wage should be $10.50. Fine. Nice. We’ll take it. But don’t be fooled. It’s cynicism. It’s caprice. Someone with no respect for these institutions is someone who will destroy them. Bush wanted his war in Iraq. To do so, he (and Cheney and Rumsfeld and their gang) had to bend the Pentagon and the CIA to their will. They did this, and it was appalling. But they had enough respect for the institutions that they knew that they had to make it all look good, make it look official, make it so that the CIA could emerge from John Yoo’s interpretation of torture with the capacity to say, “Well, that was then, this is now.” Bush and Cheney twisted these institutions but would never destroy them. Trump will destroy them, if keeping Trump on top requires it. Or try to. He might not succeed. And that is where we rest our hope—on conservative judges who will choose our institutions over Trump. Mark my words: It will come to this. In the meantime, there will be the daily, weekly, monthly slog of feeling the man drag us all down, as he already has. How much worse are we as a people than we were 17 months ago? It’s impossible to measure precisely. But we know that we’ve gone from being shocked at the idea of having a presidential candidate shout about building a wall to debating whether Congress would appropriate the funds for it; from being scandalized at the very idea of a Muslim registry to wondering how such a thing could be implemented; from being aghast that a sexual predator could sit in the Oval Office to not even mentioning it anymore. All that happened without him even being president. To what will we be sensitized with him holding the office? We survived the crooks and liars and incompetents and alcoholics. I think we’ll survive Trump too. But it will require people on the left and the right to guard our institutions, and to say to him no, you just can’t do that. I was struck Thursday by words written by Eliot A. Cohen, a conservative, writing in The American Interest: “nothing will teach him gravitas, magnanimity, or wisdom.” No, nothing will. But I still hold out the hope that we the people can punish him for his lack of those qualities, his lack of any belief system. He didn’t win a majority of our votes. He doesn’t today have a majority of our support. And time will show that gravitas, magnanimity, and wisdom, especially wisdom, still matter.
{ "pile_set_name": "OpenWebText2" }
MSHTML SoC project summary On Sun, 2005-10-02 at 15:25 +0200, Jacek Caban wrote: > As Dimi suggested, I'm writing here a summary of my > SoC project. Thanks for taking the time to do so -- it has been most informative. > - More functionality of MSHTML: there are leaks in its > functionality. Although I don't think edit mode is something > we should really care, there are things like refresh or stop. A detailed and explicit TODO listing all the known missing bits on the Wiki page would be golden. > - WebBrowser control implementation - when we have > its true implementation, MSHTML will become truly useful > and in most apps HTML pages should work out of box. Ditto for this one, with maybe a plan of attack (if you have one) and some effort estimate (if you know). This is really cool stuff, keep up the good work! -- Dimi Paun <dimi at lattica.com> Lattica, Inc.
{ "pile_set_name": "Pile-CC" }
Isn't that the normal product cycle for iPhones? The new one comes out, so the old one becomes the cheap one? The 5s comes out, so the 5 becomes the low-cost version? Right now I can go get a nice, cheap 4s since the 5 came out recently. Why would I want to buy an iPhone that's even cheaper (crappier) than just buying last year's model? The lol part is they still want to sell you an Iphone 4 for $450 off contract or a 4S for $550 off contract. That's quite the racket they have going on over there. Yeah, this is why this doesn't make sense. How much different is a stripped down iPhone 5 going to be from a 4 or 4S? On one hand this could be all about marketing -- people rather have the iPhone 5L than the 4 because the model number is one digit greater, but at the same time, I don't think Apple would want to dilute the brand by introducing a new product that is clearly inferior to existing ones. Enfenestrate:Isn't that the normal product cycle for iPhones? The new one comes out, so the old one becomes the cheap one? The 5s comes out, so the 5 becomes the low-cost version? Right now I can go get a nice, cheap 4s since the 5 came out recently. Why would I want to buy an iPhone that's even cheaper (crappier) than just buying last year's model? Enfenestrate:Isn't that the normal product cycle for iPhones? The new one comes out, so the old one becomes the cheap one? The 5s comes out, so the 5 becomes the low-cost version? Right now I can go get a nice, cheap 4s since the 5 came out recently. Why would I want to buy an iPhone that's even cheaper (crappier) than just buying last year's model? Robert Cringley has good insight into why and how it all comes back to the Chinese market: Link thisone:Enfenestrate: Isn't that the normal product cycle for iPhones? The new one comes out, so the old one becomes the cheap one? The 5s comes out, so the 5 becomes the low-cost version? Right now I can go get a nice, cheap 4s since the 5 came out recently. Why would I want to buy an iPhone that's even cheaper (crappier) than just buying last year's model? Robert Cringley has good insight into why and how it all comes back to the Chinese market: Link Well I use Mac/Linux...:I'm not sure how well it would sell, being that the whole point of owning an iPhone is so people know how much you spent on your phone. It wouldn't do to let people see you bought the cheap model. ...because nobody who uses an Apple product actually bought it because they liked it. Well I use Mac/Linux...:I'm not sure how well it would sell, being that the whole point of owning an iPhone is so people know how much you spent on your phone. It wouldn't do to let people see you bought the cheap model. Well I use Mac/Linux...:I'm not sure how well it would sell, being that the whole point of owning an iPhone is so people know how much you spent on your phone. It wouldn't do to let people see you bought the cheap model. When you see someone with an iPhone, how quickly can you tell which model they have? The "cheap" one will probably look just like the new one. In fact, that may be exactly what the "cheap" one is: last year's model in this year's case. Of course, as people start to figure that out, simply owning an iPhone won't be enough anymore. People will have to put some new piece of flair on their phone to show that they spent more. jonny_q:Well I use Mac/Linux...: I'm not sure how well it would sell, being that the whole point of owning an iPhone is so people know how much you spent on your phone. It wouldn't do to let people see you bought the cheap model. When you see someone with an iPhone, how quickly can you tell which model they have? The "cheap" one will probably look just like the new one. In fact, that may be exactly what the "cheap" one is: last year's model in this year's case. Of course, as people start to figure that out, simply owning an iPhone won't be enough anymore. People will have to put some new piece of flair on their phone to show that they spent more. styckx:jonny_q: Well I use Mac/Linux...: I'm not sure how well it would sell, being that the whole point of owning an iPhone is so people know how much you spent on your phone. It wouldn't do to let people see you bought the cheap model. When you see someone with an iPhone, how quickly can you tell which model they have? The "cheap" one will probably look just like the new one. In fact, that may be exactly what the "cheap" one is: last year's model in this year's case. Of course, as people start to figure that out, simply owning an iPhone won't be enough anymore. People will have to put some new piece of flair on their phone to show that they spent more. You gotta love that since the phones get old so fast the older models tend to be found cheaper on craigslist than the newest ipod touch which typically has lower specs. Then again why does the ipod touch still exist? Because there are people who just want a media player; the fact that it can do almost everything that aniPhone can do except make phone calls is a bonus. That's why I bought one; it really is an iPad Mini(the 4G model is, anyway). moothemagiccow:RaverRevolution: Get ready for your iphone 5 to be obsolete!! You gotta love that since the phones get old so fast the older models tend to be found cheaper on craigslist than the newest ipod touch which typically has lower specs. Then again why does the ipod touch still exist? pre-teens (for now) and morons Or people who don't want to pay for the internet twice(or more for a family), but still like to take advantage of the ubiquity of wifi, and need a toilet diddling device.Perhaps smartphone users, including me, are the morons. StoPPeRmobile:Enfenestrate: Isn't that the normal product cycle for iPhones? The new one comes out, so the old one becomes the cheap one? The 5s comes out, so the 5 becomes the low-cost version? Right now I can go get a nice, cheap 4s since the 5 came out recently. Why would I want to buy an iPhone that's even cheaper (crappier) than just buying last year's model? Walmart has already made apple their biatch because for the last two weeks through this Saturday Walmart has been selling iphone 5s for 127 bucks. Apple has to come out with a lower cost iphone because last years Android models that do everything the I5 does are zero dollars. Samsung Skyrocket 16 gigs, nfc, 4g, expandable memory, removable battery. The only difference is proc speed, a few pixels, and a slightly newer bluetooth spec. Apple was only playing catch up, and they did not do that good a job. theflatline:Walmart has already made apple their biatch because for the last two weeks through this Saturday Walmart has been selling iphone 5s for 127 bucks. Apple has to come out with a lower cost iphone because last years Android models that do everything the I5 does are zero dollars. Samsung Skyrocket 16 gigs, nfc, 4g, expandable memory, removable battery. The only difference is proc speed, a few pixels, and a slightly newer bluetooth spec. Apple was only playing catch up, and they did not do that good a job. Enfenestrate:Isn't that the normal product cycle for iPhones? The new one comes out, so the old one becomes the cheap one? The 5s comes out, so the 5 becomes the low-cost version? Right now I can go get a nice, cheap 4s since the 5 came out recently. Why would I want to buy an iPhone that's even cheaper (crappier) than just buying last year's model? I think AT&T and Verizon is giving them grief about not having a cheaper LTE model. Both carriers have made a huge investment in LTE, and they can't leverage that investment by selling non-LTE iPhone 4 and 4S models to customers. Back in the day when they were the only popular smartphone in town, Apple could tell the carriers to go fark themselves, but when you have Android phones dominating the market and models like the Galaxy S3 rivaling the iPhone 5 for popularity, Apple suddenly has to play ball with the carriers again and give them the LTE phones that they want. StoPPeRmobile:Mad_Radhu: Back in the day when they were the only popular smartphone in town When was that? 2007 to 2009. Before Verizon launched the Droid, there really weren't any smartphones outside of Blackberry/Sidekick that really got the public excited the way the iPhone did. Prior to the iPhone, it was pretty rare for non-business customers to pony up for a premium smartphone, plus a data and texting plan. The iPhone basically moved a big chunk of the non-techie public from cheap Razrs that were just used for phone calls into more profitable plans for the carriers, which is why AT&T wanted it so badly and Verizon, T-Mobile, and Sprint were all trying to come up with iPhone killers. You could probably even argue that it wasn't really until the release of the Galaxy S phones in mid-2010 that the iPhone really had credible competition, so AT&T and Apple pretty much had that lucrative market of new smartphone users to themselves until then.
{ "pile_set_name": "Pile-CC" }
Telehealth exercise-based cardiac rehabilitation: a systematic review and meta-analysis. Despite proven effectiveness, participation in traditional supervised exercise-based cardiac rehabilitation (exCR) remains low. Telehealth interventions that use information and communication technologies to enable remote exCR programme delivery can overcome common access barriers while preserving clinical supervision and individualised exercise prescription. This meta-analysis aimed to determine the benefits of telehealth exCR on exercise capacity and other modifiable cardiovascular risk factors compared with traditional exCR and usual care, among patients with coronary heart disease (CHD). CINAHL, The Cochrane Library, Embase, MEDLINE, PubMed and PsycINFO were searched from inception through 31 May 2015 for randomised controlled trials comparing telehealth exCR with centre-based exCR or usual care among patients with CHD. Outcomes included maximal aerobic exercise capacity, modifiable cardiovascular risk factors and exercise adherence. 11 trials (n=1189) met eligibility criteria and were included in the review. Physical activity level was higher following telehealth exCR than after usual care. Compared with centre-based exCR, telehealth exCR was more effective for enhancing physical activity level, exercise adherence, diastolic blood pressure and low-density lipoprotein cholesterol. Telehealth and centre-based exCR were comparably effective for improving maximal aerobic exercise capacity and other modifiable cardiovascular risk factors. Telehealth exCR appears to be at least as effective as centre-based exCR for improving modifiable cardiovascular risk factors and functional capacity, and could enhance exCR utilisation by providing additional options for patients who cannot attend centre-based exCR. Telehealth exCR must now capitalise on technological advances to provide more comprehensive, responsive and interactive interventions.
{ "pile_set_name": "PubMed Abstracts" }
Police responded to an incident in central London on Saturday night following a report a van has hit a number of pedestrians on London Bridge and of stabbings in nearby Borough Market. The Prime Minister confirmed the incident is being treated as an act of terrorism. At 22:08hrs British Summer Time (BST) on Saturday, Metropolitan Police officers responded to reports of a vehicle in collision with pedestrians. Police say the vehicle carried on down Borough Market where it came to a stop and three attackers then disembarked from the vehicle. They began stabbing members of the public with knives in pubs and restaurants in the popular dining area, some fatally. Within eight minutes of first calls being made, at 22:16, the three attackers were shot dead by armed officers outside of the Wheatsheaf Pub. The Metropolitan has confirmed seven fatalities, in addition to the three terrorists, and 48 injured individuals being treated in five hospitals across the city. Updates to the live blog continue below… 12:30 BST — Victims from all over the world While the identity of one of the victims of Saturday’s attack has been revealed as Canadian citizen Chrissy Archibald, there are six more known to have been killed by the three Islamist knifemen. No more names have come forward, but speaking at the scene at a press conference Monday afternoon London Mayor Sadiq Khan revealed the nationalities of the other victims, who may include the dead and injured. He said: “the victims include not just people from London, but people from Australia, New Zealand, Canada, France, Spain… you realise what a truly global city London is”. 12:00 — Attack suspect may have appeared in Channel 4 Jihad documentary Revelations made overnight suggest one of the London Bridge attackers was allegedly a well-known Islamist, who had even appeared on a Channel 4 documentary about Islamic extremism in the United Kingdom, and was seen praying to an Islamic State battle flag in a London park. Read more here. 10:00 BST — More counter-terror arrests London’s Metropolitan Police and Counter Terrorism Command have made a number of new raids on London addresses, as they seek accomplices of Saturday’s terror trio who attacked London Bridge. Somewhat unusually, the number of individuals arrested and detained under terrorism legislation during these raids has not seen specified. Scotland Yard said in a statement this morning: At around 04:15hrs on Monday, 5 June, officers from the Met’s Counter Terrorism Command investigating the London Bridge terror attack entered two further addresses – one in Newham and another in Barking. A number of people have been detained and are at present being spoken to. Searches are ongoing at both addresses. The force has said an “enormous” amount of forensic material had been seized during the course of the searched. As of Sunday afternoon, 12 arrests had taken place. 02:14 BST Christine Archibald, a young woman originally from Castlegar, B.C., was among the seven people killed in Saturday night’s attack in London. 00:09 BST 23:15 BST – Islamic State has claimed responsibility for the London Bridge terror attack BREAKING: The head of the SITE intelligence group says the Islamic State group has claimed responsibility for the London attacks. — The Associated Press (@AP) June 4, 2017 According to the AP: “The SITE Intelligence Group says Islamic State’s news agency is claiming fighters for the extremist group carried out the van and knife attack in London that left seven people dead. “SITE said in a statement Sunday that the Islamic State’s Aamaq news service cited ‘a security source’ in the Arabic-language posting claiming the attack. “Islamic State has often made such claims not just when it has sent attackers, but when extremists carrying out deadly plots were inspired by the group’s ideology. “It’s the third attack this year that Islamic State has claimed in Britain, after the bombing in Manchester and a similar attack in the heart of London in March. “The three attackers in Saturday’s attack have not been identified.” 22:40 BST – Metropolitan Police Assistant Commissioner Mark Rowley confirms arrests following raids in Barking; identities of three men responsible to be released as soon as operationally possible. “Officers have been working tirelessly to process the crime scenes and release the cordons. We are hopeful that some of the cordons around London Bridge station will be released during the course of tomorrow morning… “The public can expect to see additional police – both armed and unarmed officers – across the Capital as you would expect in these circumstances. And our security and policing plans for events are being reviewed, the public will also see increased physical measures on London’s bridges to keep the public safe.” Officers have made 12 arrests and are at present searching 4 properties. [A] 38-year-old woman arrested at address 1 in Barking; [B] 28-year-old man arrested at address 2 in Barking; [C] 52-year-old man arrested at address 2 in Barking; [D] 55-year-old man arrested at address 2 in Barking; [E] 27-year-old man arrested at address 2 in Barking; [F] 55-year-old man arrested at address 2 in Barking, who has since been released without charge; [G] 49-year-old woman arrested at address 2 in Barking; [H] 60-year-old woman arrested at address 2 in Barking; [I] 19-year-old woman arrested at address 2 in Barking; [J] 27-year-old female arrested at address 2 in Barking; [K] 24-year-old female arrested at address 2 in Barking; [L] 53-year-old woman arrested at address 2 in Barking; “There have been no arrests at two residential addresses in Newham, although a number of people have been spoken to. “During the arrest stage Sunday no officers have deployed a TASER or a firearm. “All of those arrested have been detained under the Terrorism Act.” AC Rowley stated the Met will release the identities of the three men directly responsible for the attacks as soon as operationally possible. 22:30 BST – Borough Station has now reopened #Borough – the station has now reopened, following an earlier police investigation. — TfL Travel Alerts (@TfLTravelAlerts) June 4, 2017 20:55 BST – Acting United States Ambassador to the United Kingdom Lewis Lukens has offered his condolences and support. Praises London Mayor Sadiq Khan The response from emergency services, law enforcement & officials in Ldn–as well as ordinary Londoners–has been extraordinary. – LLukens 2/3 — U.S. Embassy London (@USAinUK) June 4, 2017 I commend the strong leadership of the @MayorofLondon as he leads the city forward after this heinous attack. – LLukens 3/3 https://t.co/p4dDZuCpyO — U.S. Embassy London (@USAinUK) June 4, 2017 20:20 BST – One Canadian citizen confirmed amongst the fatalities The prime minister of Canada, Justin Trudeau, issued the following statement after Saturday night’s terrorist attack: “Canada strongly condemns the senseless attack that took place last night in London, United Kingdom, which killed and injured many innocent people. I am heartbroken that a Canadian is among those killed. “We grieve with the families and friends of those who have lost loved ones, and wish all those injured a speedy and full recovery. “Londoners and people across the United Kingdom have always displayed strength and resilience in the face of adversity. We recently witnessed this after the attacks in Manchester and in the Westminster area of London. This time will be no different. “These hateful acts do not deter us; they only strengthen our resolve. Canadians stand united with the British people. We will continue to work together with the United Kingdom and all our allies to fight terrorism and bring perpetrators to justice. “The Government of Canada will not comment further at this time out of respect for the family.” Canadian Prime Minister Justin Trudeau: 'I am heartbroken that a Canadian is among those killed." #LondonAttacks pic.twitter.com/NEO4nTyGbF — CanadianUK (@CanadianUK) June 4, 2017 18:50 BST – French citizens amongst the injured, one Frenchman killed One Frenchman was killed and seven other French nationals were wounded in Saturday night’s attack, the French foreign minister, Jean-Yves Le Drian, has confirmed. Four of the injured French are in a critical condition and one more is still unaccounted for, he said. We are very sad to report the death of 1 french citizen in the #LondonAttacks. 7 compatriots are injured (4 badly) and one pers is missing. — French Embassy UK (@FranceintheUK) June 4, 2017 16:50 BST – Met Assistant Commissioner Mark Rowley gives an update on terror attack, confirming eight police officers discharged their weapons Mr. Rowley confirmed the Met are “are making significant progress in identifying the three attackers, and that there were no other suspects at the scene, when the attack was carried out”. “Work is ongoing to understand more about them, their connections and whether they were assisted or supported by anyone else. As I think you are aware there are searches ongoing in east London, and 12 arrests have been made. There is of course more to do, and we will work relentlessly to establish the facts.” The Met has confirmed that the van used in the attack, a white Renault van, was recently hired by one of the attackers. “Our understanding is growing and as we currently understand it the van entered London Bridge at 21:58 travelling from the North to the South side of the river. The van mounted the pavement, and collided with pedestrians before being abandoned, where the attackers, armed with knives, continued into the Borough Market area, stabbing numerous people. “The attackers were then confronted by the firearms officers and I can confirm that eight police firearms officers discharged their weapons. Whilst this will be subject to thorough investigation by the IPCC our initial assessment is that in the region of 50 rounds were discharged by 8 officers. The three attackers were shot dead.” “As the officers confronted the terrorists – and were shot – a member of the public also suffered gunshot wounds. Although we do not believe the injuries to critical in nature, they are in hospital receiving medical attention. We will of course keep you updated on that.” Mr. Rowlety confirmed that seven people had been killed in addition to the three attackers and work was ongoing to inform next of kin. He said that the cordons in and around the London Bridge and Borough Market area will remain in place. “The public can expect to see additional police – both armed and unarmed officers – across the Capital. And our security and policing plans for events are being reviewed. The public will also see an increased physical measures in order to keep public safe on London’s bridges,” he added. 16:30 BST – Searches are taking place at a property on a shop complex in East Ham, London Sky Sources: searches are taking place in East Ham in London following the London Bridge attack — Sky News Breaking (@SkyNewsBreak) June 4, 2017 15:55 BST – NHS England confirms 21 people are still in critical condition NHS England has said 36 people are still in hospital, 21 people in a critical condition after the attack. 36 patients still in hospital after London attacks – 21 in critical care – Theresa May visited King's College Hospital — Hugh Pym (@BBCHughPym) June 4, 2017 15:50 BST -‘ Incredibly brave’ stabbed police officer fought off attackers armed with just a baton now in stable condition The Telegraph reports that the British Transport Police officer who confronted the attackers was armed with only a baton. BTP said the officer has only been with the force for two years. He is believed to be in a stable condition and recovering from his injuries in hospital suffering face, head, and leg injuries. BTP chief constable Paul Crowther, who visited the officer in hospital, said he showed “enormous courage in the face of danger”. He said: “Although he is seriously unwell, he was able to recount how he faced the attackers armed only with his baton, outside London Bridge station. “For an officer who only joined us less than two years ago, the bravery he showed was outstanding and makes me extremely proud. “All of us at BTP wish him a swift recovery, and I know he will be touched by the hundreds of messages of support from across the UK and the world. “Our thoughts are with all of those who died or were injured, and their loved ones as they try to come to terms with what happened.” 15:20 BST – UKIP MEP Nigel Farage Slams Sadiq Khan and Theresa May for their responses to terror attack saying: “People want action.” “I’m afraid we’ve been absolutely hidebound in this country by political correctness,” Mr. Farage said. “I’m afraid that one of those people who simply hasn’t done enough is Theresa May. She was the one who was for six years our home secretary. She was in charge of homeland security. “Today she stood on the steps of Downing Street and said: ‘Enough is enough‘.” “For the prime minister just to say ‘enough is enough’ that is not going to satisfy people – people want action.” For more on Nigel Farage’s comments, read here. 14:20 BST – Prime Minister of Israel responds to news of the London Bridge Terror attack The prime minister of Israel Binyamin Netanyahu’s office tweeted: “London Bridge will not fall. Together we will vanquish terror. # LondonAttacks” London Bridge will not fall. Together we will vanquish terror. #LondonAttacks — PM of Israel (@IsraeliPM) June 4, 2017 The note of support comes after Israel’s Foreign Ministry and members of the Knesset on Sunday condemned the “horrific” London terror attacks, with Public Security Minister Gilad Erdan remarking that now there was a “greater understanding” in Britain of Israel’s long-suffering history of Palestinian terrorism. 13:40 BST – 12 Arrests in Barking London Metropolitan Police have confirmed that officers from the Met’s Counter Terrorism Command have arrested 12 people in Barking, east London, in connection with last night’s incidents in London Bridge and the Borough Market area. Searches of a number of addresses in Barking are continuing. For more on this story read here. 13:00 BST – Report – first police officer on the scene took on all terrorists until forced to the ground. In serious condition in hospital. According to Sky News sources, the first police officer on the scene, a rugby player, took on all the terrorists until he was forced to ground. He is reportedly in serious condition in hospital. Sky sources:first police officer on the scene (rugby player) took on all terrorists until he was forced to ground. Serious condition in hosp — Kay Burley (@KayBurley) June 4, 2017 12:35 BST – U.S. President Donald Trump comments on Sadiq Kahn’s statement that Londoners “shouldn’t be alarmed” At least 7 dead and 48 wounded in terror attack and Mayor of London says there is "no reason to be alarmed!" — Donald J. Trump (@realDonaldTrump) June 4, 2017 London Mayor Sadiq Khan told media earlier on: “Londoners should be aware that there will be additional armed and unarmed police officers on our streets from tonight in order to keep Londoners, and all those visiting out city safe. “I want to reassure all Londoners, and all our visitors, not to be alarmed. Our city remains one of the safest in the world. “London is the greatest city in the world and we stand together in the face of those who seek to harm us and destroy our way of life. “We always have and we always will. Londoners will never be cowed by terrorism.” 12:30 BST – Arrests following raids in Barking Five people are reportedly being held after armed police raided flats in Barking following last night’s Islamist terror attack near London Bridge. For more from Breitbart London read here. 12:00 BST – Man photographed attacker https://twitter.com/Jim_Edwards/status/871295844414349312 Gabrielle Sciotto, who took the photograph, described the image to the BBC who said the suspect appears to have materials strapped to his body which looked like a bomb and is bleeding from his left arm. “I saw three men with this belt with some sort of bomb-looking explosive on them. “I thought it wasn’t real. It didn’t look real. I don’t know if that was or wasn’t.” “By the time a couple more police came to the scene, and they surrounded these people and they shot them down.” Police confirmed that the explosive vests were hoaxes. 11:00 BST – Prime Minister Theresa May’s Statement Following Chairing COBRA – Britain has become “too tolerant of extremism”, vows to tackle “safe spaces” of Islamist extremism. Prime Minister Theresa May made a statement outside of 10 Downing Street following chairing the meeting of COBRA: Referencing the Westminster terror attack and Manchester attack, Ms. May said: “In terms of planning and execution, the recent attacks are not connected. But we believe we are experiencing a new trend in the threats we face as terrorism breeds terrorism and perpetrators are inspired to attack not only on the basis of carefully constructed plots after years of planning and training and not even of attackers radicalising online, but copying one another.” “We cannot and must not pretend that things can continue as they are. Things need to change and need to change in four important ways”: 1) Ms. May stated that the attacks are bound together by “the single ideology of Islamist extremism” which she called “a perversion of Islam”. “Defeating this ideology is the greatest challenge of our time. But we cannot defeat it through military intervention alone” or permanent defensive counterterrorism operations. She said it will only be defeated when “people’s minds are turned away” from Islamism and they are “made to understand that our values…are superior to anything offered by the preachers of and supporters of hate”. 2) “Safe spaces” where this ideology is allowed to breed online must be tackled, she said, saying that they need to work with foreign governments to reach “international agreements that regulate cyberspace to prevent the spread of extremism and terrorism planning”. 3) The prime minister also targeted “safe spaces that exist in the real world”. “Yes that means military action to destroy ISIS in Iraq and Syria, but that also means taking action here at home” “Yes that means military action to destroy ISIS in Iraq and Syria, but that also means taking action here at home.” “There is, to be frank, too much tolerance of extremism in the country. So we need to become far more robust in identifying it and stamping it out across the public sector and across society. “That will require often embarrassing and difficult conversations. But the whole of our country needs to come together to take on this extremism and we need to live our lives not as a series of separted, segregated communities but as one truly United Kingdom.” 4) Robust counter terrorism strategy: “As the nature of the threat become more complex, fragmented, and hidden, especially online, the strategy needs to keep up. so in light of what we are learning about the changing threat we need to review Britain’s counter terrorism strategy to make sure police and secruity services have all the power they need. And if we need to increase the length of custodial sentences for terror-related ofences, even apparently less serious offences, that is what we will do.” “It is time to say enough is enough. Everbody must go about their lives as they normally would.” The prime minister stated that the Conservative and other parties will suspend campaigning for Sunday, but the election will go ahead as planned on Thursday. Enough is enough. Read my response to last night’s brutal terror attack: https://t.co/MHQ4SPG0aQ — Theresa May (@theresa_may) June 4, 2017 10:40 BST – Live police operating in Barking Sky News reports a block of flats in Barking have been taped off and a police operation is underway. 10:25 BST – Theresa May statement on the attack expected Sunday morning The prime minister has led a meeting of crisis response committee COBRA and will make a statement Sunday morning. I have just led a meeting of COBR in response to the appalling London attack and I will soon be making a statement in Downing Street. — Theresa May (@theresa_may) June 4, 2017 10:00 BST – UKIP Leader Paul Nuttall confirms the party will not suspend national campaigning. In a press release released Sunday morning, Mr. Nuttall stated: “With more people murdered on the streets of our capital city last night by Islamist terrorists, it is more important than ever for us to confront this evil with the democratic principles that have made this country what it is. “Our hearts go out to the family and friends of those who lost their lives last night. The courage and quick response of our emergency services have yet again saved countless lives and in the midst of such a tragedy, deserve our respect and admiration. “It is time to start honouring our dead with more than just words. The only guarantee that will come from our choosing to stall the democratic process again will be more attacks; it is what these cowards want us to do. “For those of us seeking to serve the people of this country, it is our duty to drive the dialogue on how best to confront and defeat this brand of terrorism. That is what UKIP will be doing today and beyond. Therefore, I refuse to suspend campaigning because this is precisely what the extremists would want us to do.” The Labour Party, Conservatives, and SNP have confirmed they will be suspending campaigning. Conservatives, Labour, Lib Dems, SNP & Greens suspend their national election campaigns following the London attack https://t.co/Ymz519DxCD pic.twitter.com/Bp2Ao7WkwW — BBC News England (@BBCEngland) June 4, 2017 09:50 BST – Parts of London Bridge return to normal, police and cordons remain in place Activity has resumed on London Bridge Sunday morning with Double Decker buses seen crossing the bridge. However, police cordons remain in place. Photo by Rachel Megawhat/Breitbart London Photo by Rachel Megawhat/Breitbart London 09:35 BST – Metropolitan Police Commissioner Cressida Dick Confirms Seventh Death, Incident “under control” Metropolitan Police Commissioner Cressida Dick has confirmed that seven members of the public have died in addition to the 3 attackers, 48 people were injured and taken to hospital for treatment. “We believe this incident is under control”, but the cordon will remain in place as police need t conduct a thorough search to ensure everyone is accounted for and to make area safe. 7 members of the public died in #LondonAttacks as well as 3 attackers – London Met police chief Cressida Dick https://t.co/ptuTcTqqL2 pic.twitter.com/MpTm7wbtl8 — BBC News (UK) (@BBCNews) June 4, 2017 “At the moment we believe there are three attackers, and they are dead,” Ms. Dick confirmed to reporters. 09:20 BST – Armed Officers at Borough Market Sunday Morning Armed officers with ballistic shields are currently moving through the Borough Market area carrying out searches. 09:15 BST – Metropolitan Police are appealing for images and film of the attack Anybody who has images or film of the #LondonBridge #BoroughMarket incident please help police by uploading it at https://t.co/YKydWRtFm3 pic.twitter.com/l0VlrPbwCI — Counter Terrorism Policing UK (@TerrorismPolice) June 4, 2017 6:25 BST – London Ambulance now updates that 48 injured people from the attack were taken to five hospitals We have taken 48 patients to hospital following the incident at #LondonBridge https://t.co/hCiKVCBrnb pic.twitter.com/5ipl5vtcTB — London Ambulance (@Ldn_Ambulance) June 4, 2017 5:50 BST – Dutch populist leader Geert Wilders: London, Manchester, Berlin, Nice, Paris etc it will all happen again and again until we acknowledge that Islam is the problem and fight back — Geert Wilders (@geertwilderspvv) June 4, 2017 4:55 BST – British Transport Police report one of their officers is seriously injured in the attack We can confirm a BTP officer was seriously injured as he responded to tonight’s incident at London Bridge & Borough https://t.co/pev4Hb3904 pic.twitter.com/VG2DwqA3C5 — BTP (@BTP) June 4, 2017 4:35 BST – London Ambulance updates patient count from attack to 30 Our latest statement on the #LondonBridge incident. We have taken 30 patients to five hospitals across London https://t.co/hCiKVCBrnb pic.twitter.com/B3PrRKoMUR — London Ambulance (@Ldn_Ambulance) June 4, 2017 4:05 BST – Scotland Yard confirms at least six dead from terror attack During a press conference, Metropolitan Police Assistant Commissioner Mark Rowley stated that six people were dead and three attackers were shot and killed by police. “You will understand that our knowledge of the incident is still growing but what we understand at the present time is: At 22:08hrs yesterday evening we began to receive reports that a vehicle had struck pedestrians on London Bridge. The vehicle continued to drive from London Bridge to Borough Market. The suspects then left the vehicle and a number of people were stabbed, including an on-duty British Transport Police officer who was responding to the incident at London Bridge. He received serious but not life-threatening injuries. His family has been informed. Armed officers responded very quickly and bravely, confronting three male suspects who were shot and killed in Borough Market. The suspects had been confronted and shot by the police within eight minutes of the first call. The suspects were wearing what looked like explosive vests but these were later established to be hoaxes. …” Full statement here. Breaking News: #London police said that at least nine people, including three attackers, were killed in the attacks late Saturday night. pic.twitter.com/3zmkmuPl89 — Fox News (@FoxNews) June 4, 2017 03:45 BST – U.S. President Donald Trump calls UK Prime Minister Theresa May. Statement from the White House: THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE June 3, 2017 READOUT OF PRESIDENT DONALD J. TRUMP’S CALL WITH PRIME MINISTER THERESA MAY OF THE UNITED KINGDOM President Donald J. Trump spoke with Prime Minister Theresa May of the United Kingdom today. The President offered his condolences for the brutal terror attacks on June 3 in central London. He praised the heroic response of police and other first responders and offered the full support of the United States Government in investigating and bringing those responsible for these heinous acts to justice. ### 03:05 BST – London Ambulance confirms at least 20 patients have been taken to six hospitals across London Our latest statement about the incident in #LondonBridge. We have taken at least 20 patients to six hospitals across London. pic.twitter.com/eDRdk48CBu — London Ambulance (@Ldn_Ambulance) June 4, 2017 02:50 BST – Photo appears to show a suspect with a canister strapped to him A photo taken by London-based photographer Gabriele Sciotto appears to show a man with a canister strapped to his body near the initial terror attack site. London terror attacks: The photographer of this image says it shows the attacker on the ground (Pic: Gabriele Sciotto) pic.twitter.com/mId3dHtHh2 — Sky News (@SkyNews) June 4, 2017 02:30 BST – Eyewitness account of stabbing on London Bridge BBC’s political correspondent Mark Lobel interviews a man who witnessed the stabbing on London Bridge during the attack: Terrifying testimony from stabbing witness Gerard who just spoke to me about what happened #LondonBridge pic.twitter.com/Rn8cNfklHH — Mark Lobel (@marklobel) June 4, 2017 02:00 BST – London Mayor Sadiq Khan releases statement Khan, who said last September that the threat of terror attacks is just “part and parcel of living in a big city,” just released a statement acknowledging Saturday’s attacks were acts of terror: We don’t yet know the full details, but this was a deliberate and cowardly attack on innocent Londoners and visitors to our city enjoying their Saturday night. I condemn it in the strongest possible terms. There is no justification whatsoever for such barbaric acts. His full statement here. 01:25 BST – Air Ambulance emergency services, SAS deployed Emergency services have confirmed an advanced trauma unit from the Air Ambulance has been dispatched to the scene Our latest statement about #LondonBridge incident. We've sent a number of resources to scene & more info will follow https://t.co/hCiKVCBrnb pic.twitter.com/nCoIPoXCrV — London Ambulance (@Ldn_Ambulance) June 4, 2017 There is also speculation that the SAS has been deployed. 01:15 BST – Telegraph reports assailant shouted “this is for Allah” The Telegraph has reported that an eye witness on London Bridge told the BBC he saw three men stabbing people indiscriminately, shouting “this is for Allah”. He told the paper that he saw a van driving on the pavement with people running out of the way before three men got out. “They literally just started kicking them, punching them, they took out knives. It was a rampage really,” he said “They headed down towards Southwark Cathedral towards the bar, and starting running at people. “People at the bar started fighting back. then the three of them decided to make their way up to the bridge “A woman was staring at them and they started stabbing her. “Throughout the whole way across the bridge, there were people littered across bleeding. People were trying to help each other.” He added he had heard them shouting “this is for Allah” 01:00 BST – Reuters reporting witness saw people having their throats cut Reuters is reporting that a person who was on London Bridge after an incident on Saturday told a Reuters reporter that she saw three people who appeared to have their throats cut. 00:45 BST – The incident is ongoing and members of the public are being advised to avoid the London Bridge and Borough Market areas Pls continue to avoid #LondonBridge #BoroughMarket to allow the emergency services to deal with the ongoing incidents — Metropolitan Police (@metpoliceuk) June 3, 2017 Marine 2 and Marine 3 are part of the response to the #London Bridge incident. Working with @RNLI lifeboats to evacuate the public. — MPSonthewater (@MPSonthewater) June 3, 2017 00:25 BST – Prime Minister to chair COBRA, confirms incident being treated as “potential act of terrorism” reaction from U.S. President Donald Trump Prime Minister Theresa May will chair a meeting of the crisis response committee COBRA on Sunday morning. She said that the “terrible incident” in London is being treated as a “potential act of terrorism”. Ms. May said: “Following updates from police and security officials, I can fconfirm that the terrible incident in London is being treated as a potential act of terrorism. “This is a fast moving investigation. I want to express my huge gratitude to the police and emergency services who are on the scene. Our thoughts are with those who are caught up in these dreadful events.” U.S. President Donald J. Trump has voiced his support for the Britain at this time. Whatever the United States can do to help out in London and the U. K., we will be there – WE ARE WITH YOU. GOD BLESS! — Donald J. Trump (@realDonaldTrump) June 3, 2017 Downing Street: Theresa May "in contact with officials"; US President Donald Trump briefed on #LondonBridge incident https://t.co/EAkjGxcMkf — BBC Breaking News (@BBCBreaking) June 3, 2017 00:15 BST Sunday – Vauxhall area cleared, station reopened Police have confirmed that Vauxhall Station has reopened. Vauxhall: the station has reopened. — Victoria line (@victorialine) June 3, 2017 23:50 BST – Met Police advise people to “Run, Hide, Tell” Police have issued safety guidelines for people in the area. Metropolitan Police have confirmed they are responding to incidenst in London Bridge, nearby Borough Market, and Vauxhall. 23:45 BST – Met Police confirm reports of stabbings in Borough Market near London Bridge Metropolitan Police confirmed they are responding to reports of stabbings and shots have been fired. Officers are now also responding to an incident in the Vauxhall area, south of the Thames. Officers have then responded to reports of stabbings in #BoroughMarket. Armed officers responded and shots have been fired. 2/3 — Metropolitan Police (@metpoliceuk) June 3, 2017 Officers are now responding to an incident in the #Vauxhall area. 3/3 — Metropolitan Police (@metpoliceuk) June 3, 2017 23:30 BST – Downing Street confirms PM in contact with officials Downing Street said: “The prime minister is in contact with officials and is being regularly updated on the incident at London Bridge.” 23:26 BST – Met Police confirm they are responding to an incident in nearby Borough Market Metropolitan Police have confirmed they are also responding to an incident in Borough Market. Armed police are at the scene. As well as #LondonBridge officers have also responsed to an incident in #BoroughMarket. We have armed police at the scenes. — Metropolitan Police (@metpoliceuk) June 3, 2017 London Bridge and Borough stations closed due to ongoing incident. Please avoid area. Updates from @metpoliceuk — British Transport Police (@BTP) June 3, 2017 Images from the scene also show multiple police vehicles attending. 23:00 BST – video footage from inside a nearby restaurant, armed police entering Video footage from inside a restaurant in the area close to the attack appears to show patrons being advised to get down on the floor should armed police enter, later patrons are advised to get down by armed officers. BREAKING: several London police officers enter bar at London Bridge telling people to get down ##Londonbridge pic.twitter.com/D6ENve8GZS — HomeGrownManc🔴🔴 (@footballgossiph) June 3, 2017 This story is developing…
{ "pile_set_name": "OpenWebText2" }
This information was compiled from a database completed in 1994 with the help of an Indiana Heritage Research Grant. The full database contains some 48,000 names. All records "Indian Reserve" where was noted as the residence at the time of purchase were culled from the file and are listed here.
{ "pile_set_name": "Pile-CC" }
Anticancer treatment with monoclonal antibodies (mAbs) has significantly improved the clinical outcome in patients with cancer, especially when combined with chemotherapy. However, often the patients ultimately relapse. Natural killer cells could also be used as cytotoxic effector cells for cell-based immunotherapy. NK-92 is a cytolytic cancer cell line which was discovered in the blood of a subject suffering from a non-Hodgkins lymphoma and then immortalized ex vivo. NK-92 cells are derived from NK cells, but lack the major inhibitory receptors that are displayed by normal NK cells, while retaining the majority of the activating receptors. NK-92 cells do not, however, attack normal cells nor do they elicit an unacceptable immune rejection response in humans. Characterization of the NK-92 cell line is disclosed in WO 1998/49268 and U.S. Patent Application Publication No. 2002-0068044. NK-92 cells have also been evaluated as a potential therapeutic agent in the treatment of certain cancers. Although NK-92 cells retain almost all of the activating receptors and cytolytic pathways associated with NK cells, they do not express CD16 on their cell surfaces. CD16 is an Fc receptor which recognizes and binds to the Fc portion of an antibody to activate NK cells for antibody-dependent cellular cytotoxicity (ADCC). Due to the absence of CD16 receptors, NK-92 cells are unable to lyse target cells via the ADCC mechanism. The present invention provides a solution to the aforementioned problems, by augmenting the cytotoxic effect of some molecular antibodies by simultaneously or consequently administering to a subject in need of anticancer treatment NK-92 cells that express Fc receptors.
{ "pile_set_name": "USPTO Backgrounds" }
Peritrechus tristis Peritrechus tristis is a species of dirt-colored seed bug in the family Rhyparochromidae. It is found in North America. References Further reading Category:Rhyparochromidae Category:Articles created by Qbugbot Category:Insects described in 1906
{ "pile_set_name": "Wikipedia (en)" }
Q: What is the meaning of this cartoon by Dr. Seuss? I don't quite understand what the author was trying to say in this picture. Could anyone explain? http://libraries.ucsd.edu/speccoll/dswenttowar/#ark:bb4813149f A: It's possible the OP is asking this question because of the somewhat confusing verbiage on the flag in the cartoon. The flag says, "That cheap gunning for Eleanor Roosevelt." If this is the essence of the question, allow me to answer thus: "Gunning for" means "looking to, or attempting to, criticize, or in some way attack." If someone is "gunning for Roosevelt," they are looking for a chance to attack her. The cartoonist has extended the meaning slightly to include the actual attack itself. He is referring to the fact that many people "attacked" (criticized) Eleanor Roosevelt for her opinions about Japanese-American relationships. This phrase then becomes a pun when used in the cartoon, because the critics are depicted as firing actual guns. This, then, enables the cartoon Hitler to say sarcastically that Americans are good at attacking themselves, meaning Hitler is making fun of our ability to fight the war because we attack ourselves. Ultimately, the cartoonist's point is that we shouldn't be quarreling amongst ourselves, but focusing instead on the real enemy. Also, the cartoonist called the "gunning" cheap, which means it is "unworthy, too thoughtlessly done to be of any merit, and dishonorable."
{ "pile_set_name": "StackExchange" }
North Korea may well fulfil its threat to hit US targets on South Korean territory if continued pressure by Washington puts Pyongyang at an impasse, Pavel Zolotarev, a retired Russian Major General, told RT. “A US strike against North Korea may go against common logic, but when a country is governed by propaganda – and the United States are going through such a period – political decisions go beyond rational logic, and there we can have consequences that are hard to foresee,” Zolotarev warned. Read more On Wednesday, US President Donald Trump promised to bring “fire and fury like the world has never seen” on North Korea if it doesn’t stop tests aimed at the developing a nuclear-tipped long-range ballistic missile. Than the next day he went even further to say that the “fire and fury” warning to North Korea may not have been “tough enough.” Increased pressure from Washington may force the North to “be more assertive in terms of retaliatory measures,” with South Korea becoming hostage in this situation, he warned. “Strikes may be carried out, targeting either US facilities in South Korea or the South Korean territory itself,” Zolotarev, who is the Deputy Director of the Institute for US and Canadian Studies at the Russian Academy of Sciences, said. “One shouldn’t forget that the South Korean capital, Seoul, is within the reach of (North Korean) artillery,” he added. READ MORE: N. Koreans denounce Trump's 'fire & fury' threat in massive rally (VIDEO) The expert stressed that claims by Korean People’s Army that they have plans worked out to strike US bases in Guam are “no bluff.” “Every country’s military have to elaborate deployment strategies for any eventuality. It is politicians – not the military – who decide on whether or not to use such plans… So, if North Korean military talk of such plans, it means they actually have them,” he explained. If the armed confrontation between the US and the North eventually breaks out, the Americans shouldn’t expect it to be a walk in the park, Zolotarev said. “The North Korean military may inflict significant damage to US forces during a conventional conflict. Though their equipment is far beyond the American assets, their combat readiness and military morale are much higher,” he said. ‘N Koreans will sell last shirt for ICBM’ No threats from Washington or even the harshest sanctions will make Pyongyang abandon its plan to develop its own intercontinental ballistic missile (ICBM), Aleksandr Tsalko, a Russian retired Air Force general, told RT. “[The North Koreans] will sell the last shirt from their back, but will make [the missile],” Tsalko said. However, he expressed doubt that Pyongyang currently has the capability to carry out nuclear strikes against American bases in Guam and elsewhere if attacked. Read more “They claim they have one, but having a long-range missile and being capable of delivering a nuclear strike are two different things. They need to make a nuclear warhead that their missile can carry, to learn how to hit a target with it at long range,” the co-founder of the Council for Foreign and Defense Policies said. “I doubt North Korea now has a guidance system good enough for that. They can make a bang somewhere in the sea, but that’s all,” he added. Despite the US being serious about North Korean claims that it tested an ICBM, the Russian military insists that its data shows that Pyongyang only fired a mid-range missile. The former general said that while the US is overwhelmingly more powerful than North Korea, launching an attack at the country would come with a significant cost for America’s allies in the region, namely South Korea and Japan. “However few short and intermediate-range missiles North Korea has, they are enough to cause unacceptable amount of damage, if a nuclear warhead is used,” he said. “The Americans should have enough brains not to do it [attack Pyongyang]. As long as they don’t hurt North Korea, it will not take any action in return,” Tsalko said.
{ "pile_set_name": "OpenWebText2" }
Satoshi’s Bitcoin whitepaper in 2008 started a new phenomenon of using blockchain as a transparent mechanism for peer-to-peer (P2P) interactions. Although this decentralized movement is sometimes characterized as an anti-establishment narrative, cryptocurrency has the potential to elevate impact and transparency for establishments that need it most: nonprofits/charities. Charities around the world are raising funds in borderless cryptocurrency, giving local causes international visibility. Even in authoritarian countries where donating to specific causes is punished, blockchain can provide an effective, censorship-resistant alternative. IoTeX and The Giving Block share this vision, and are proud to announce a strategic partnership to use blockchain for social good! The Giving Block will become an official IoTeX Delegate, helping IoTeX grow and maintain the network. IoTeX Delegates are issued rewards in IOTX tokens and all profits earned by The Giving Block will be donated to charitable causes! We are excited to pioneer this new approach to supporting nonprofits/charities. Please consider using some/all of your votes for this great cause — even a little can make a big difference. A vote for The Giving Block is a vote for Charity! Vote here: https://member.iotex.io/delegate/5cb7febe87358f57fb17ce09 What is The Giving Block? The Giving Block helps nonprofits leverage cryptocurrency and blockchain to elevate their impact. They focus on basic blockchain education, equipping nonprofits to accept cryptocurrency donations (including IOTX!), and matching them with top projects in the industry to explore innovative use cases. The Giving Block currently partners with charitable organizations such as the Lupus Foundation of America, who will be the first recipient of the Delegate Program rewards. IoTeX Delegate Program & The Giving Block A vote for The Giving Block is a vote for Charity. 50% of all Delegate rewards will be donated to the “Charity of the Quarter” and the other 50% will be redistributed to voters. To introduce as many charities to blockchain and cryptocurrency, a new charity will be selected every three months as the recipient of rewards. In the future, we plan to work on traceability-focused dApps to add transparency into how these rewards are used. The first “Charity of the Quarter” is the Lupus Foundation of America. Lupus is a chronic autoimmune disease that can damage any part of the body. It is difficult to diagnose, a challenge to treat and potentially fatal. Currently there is no known cause or cure. Lupus affects more than 5 million people around the world. You can contribute to finding a cure by voting for The Giving Block or donating cryptocurrency (IOTX coming soon!) directly to Lupus Foundation of America on their website. Future plans for IoTeX & The Giving Block IoTeX has a longstanding history with charity, raising ~700 ETH ($400,00 USD at the time) in two charity programs in March and May 2018. The first charity program sponsored the Ethereum Foundation to fund blockchain research and the second sponsored DoraHacks, a global blockchain hackathon organizer / incubator. We are excited to now bring charity into the IoTeX Delegates Program. There are two primary goals at the intersection of blockchain and nonprofits: 1) use blockchain networks as a way to raise awareness and gather donations, and 2) ensure the charity’s funds are managed appropriately and transparently. We plan to explore how blockchain technology can benefit both of these goals — please stay tuned for more updates on our progress throughout 2019!
{ "pile_set_name": "OpenWebText2" }
Pharrell Williams, Moncler-Outerwear Collection It looks like Pharrell has been working hard lately(pause) with his new outerwear line and a new N.E.R.D. album on the way. I’m definitely going to need one of those vests. Hit the jump to see other scans. -Trademarkk
{ "pile_set_name": "Pile-CC" }
# Copyright (c) 2016, NVIDIA CORPORATION. All rights reserved. from __future__ import absolute_import from .data import DataIngestion __all__ = ['DataIngestion']
{ "pile_set_name": "Github" }
Update!: Turned these awesome images into a gigantic garland and hung it up around our house! It was so long it stretched from one end of the house to the other! We had quite the halloween party and everyone commented on how great it was! So happy to have this as part of our Halloween decoration collection for years to come! Pictures of the garland are at the end of the gallery on this page! In my notes I mentioned that I love vintage style Halloween things and oh my goodness, these are ALL THE VINTAGE HALLOWEEN THINGS! Look how many! It was so much fun to open all of these and lay them out, then painstakingly decide which ones were my favorites because of course I've gotta do that! Really I love all of them, including the gorgeous card! These will be great decoration for the vintage style Halloween party we will be throwing at our place this year, time to start putting them into decorations! Thank you for the thoughtful and detailed gift!
{ "pile_set_name": "OpenWebText2" }
Show HN: Yet another Hacker News Reader for Android. - jamhed https://play.google.com/store/apps/details?id=com.ncom.yahn Hopefully doesn&#x27;t suck. ====== lumelet Switching between article and comments and display of nested comments are great.
{ "pile_set_name": "HackerNews" }
# Copyright (C) 2006-2020 Istituto Italiano di Tecnologia (IIT) # All rights reserved. # # This software may be modified and distributed under the terms of the # BSD-3-Clause license. See the accompanying LICENSE file for details. # FIXME All API should use a YARP_manager_API for __declspec(dllimport/dllexport) # For now always build the library as STATIC add_library(YARP_manager STATIC) add_library(YARP::YARP_manager ALIAS YARP_manager) set(YARP_manager_HDRS yarp/manager/application.h yarp/manager/arbitrator.h yarp/manager/binexparser.h yarp/manager/broker.h yarp/manager/data.h yarp/manager/execstate.h yarp/manager/executable.h yarp/manager/fsm.h yarp/manager/graph.h yarp/manager/kbase.h yarp/manager/localbroker.h yarp/manager/logicresource.h yarp/manager/manager.h yarp/manager/manifestloader.h yarp/manager/module.h yarp/manager/node.h yarp/manager/physicresource.h yarp/manager/primresource.h yarp/manager/resource.h yarp/manager/scriptbroker.h yarp/manager/singleapploader.h yarp/manager/utility.h yarp/manager/xmlapploader.h yarp/manager/xmlclusterloader.h yarp/manager/xmlappsaver.h yarp/manager/xmlmodloader.h yarp/manager/xmlresloader.h yarp/manager/xmltemploader.h yarp/manager/yarpbroker.h yarp/manager/yarpdevbroker.h yarp/manager/ymm-types.h) set(YARP_manager_IMPL_HDRS yarp/manager/impl/textparser.h) set(YARP_manager_SRCS yarp/manager/application.cpp yarp/manager/arbitrator.cpp yarp/manager/binexparser.cpp yarp/manager/broker.cpp yarp/manager/data.cpp yarp/manager/execstate.cpp yarp/manager/executable.cpp yarp/manager/graph.cpp yarp/manager/kbase.cpp yarp/manager/localbroker.cpp yarp/manager/logicresource.cpp yarp/manager/manager.cpp yarp/manager/module.cpp yarp/manager/node.cpp yarp/manager/physicresource.cpp yarp/manager/primresource.cpp yarp/manager/resource.cpp yarp/manager/scriptbroker.cpp yarp/manager/singleapploader.cpp yarp/manager/utility.cpp yarp/manager/xmlapploader.cpp yarp/manager/xmlclusterloader.cpp yarp/manager/xmlappsaver.cpp yarp/manager/xmlmodloader.cpp yarp/manager/xmlresloader.cpp yarp/manager/xmltemploader.cpp yarp/manager/yarpbroker.cpp) source_group(TREE "${CMAKE_CURRENT_SOURCE_DIR}" PREFIX "Source Files" FILES ${YARP_manager_SRCS}) source_group(TREE "${CMAKE_CURRENT_SOURCE_DIR}" PREFIX "Header Files" FILES ${YARP_manager_HDRS} ${YARP_manager_IMPL_HDRS}) target_sources(YARP_manager PRIVATE ${YARP_manager_SRCS} ${YARP_manager_HDRS} ${YARP_manager_IMPL_HDRS}) target_include_directories(YARP_manager PUBLIC $<BUILD_INTERFACE:${CMAKE_CURRENT_SOURCE_DIR}> $<INSTALL_INTERFACE:${CMAKE_INSTALL_INCLUDEDIR}>) if(MSVC) target_include_directories(YARP_manager SYSTEM PRIVATE ${dirent_INCLUDE_DIRS}) endif() target_compile_features(YARP_manager PUBLIC cxx_std_14) target_link_libraries(YARP_manager PUBLIC YARP::YARP_os PRIVATE YARP::YARP_sig) list(APPEND YARP_manager_PUBLIC_DEPS YARP_os) list(APPEND YARP_manager_PRIVATE_DEPS YARP_sig) if(TARGET YARP::YARP_math) target_link_libraries(YARP_manager PRIVATE YARP::YARP_math) target_compile_definitions(YARP_manager PRIVATE WITH_YARPMATH) list(APPEND YARP_manager_PRIVATE_DEPS YARP_math) endif() target_include_directories(YARP_manager SYSTEM PRIVATE ${TinyXML_INCLUDE_DIRS}) target_link_libraries(YARP_manager PRIVATE ${TinyXML_LIBRARIES}) list(APPEND YARP_manager_PRIVATE_DEPS TinyXML) set_property(TARGET YARP_manager PROPERTY PUBLIC_HEADER ${YARP_manager_HDRS}) set_property(TARGET YARP_manager PROPERTY PRIVATE_HEADER ${YARP_manager_IMPL_HDRS}) set_property(TARGET YARP_manager PROPERTY VERSION ${YARP_VERSION_SHORT}) set_property(TARGET YARP_manager PROPERTY SOVERSION ${YARP_SOVERSION}) set_property(TARGET YARP_manager PROPERTY FOLDER "Libraries/Private") install(TARGETS YARP_manager EXPORT YARP_manager RUNTIME DESTINATION "${CMAKE_INSTALL_BINDIR}" COMPONENT YARP_manager LIBRARY DESTINATION "${CMAKE_INSTALL_LIBDIR}" COMPONENT YARP_manager NAMELINK_COMPONENT YARP_manager-dev ARCHIVE DESTINATION "${CMAKE_INSTALL_LIBDIR}" COMPONENT YARP_manager-dev PUBLIC_HEADER DESTINATION "${CMAKE_INSTALL_INCLUDEDIR}/yarp/manager" COMPONENT YARP_manager-dev PRIVATE_HEADER DESTINATION "${CMAKE_INSTALL_INCLUDEDIR}/yarp/manager/impl" COMPONENT YARP_manager-priv-dev) set(YARP_manager_PUBLIC_DEPS ${YARP_manager_PUBLIC_DEPS} PARENT_SCOPE) set(YARP_manager_PRIVATE_DEPS ${YARP_manager_PRIVATE_DEPS} PARENT_SCOPE)
{ "pile_set_name": "Github" }
The invention relates to an antenna reflector support which, in the radiation field, supports the passive parabolic reflector on an omnidirectional antenna for a microwave transmitter and consists in a cylindrical wall coaxial with the reflector. Originally the parabolic reflector of such an antenna was supported by two or more metal posts. These posts, however, affected the homogeneity of the field, so that the radiation diagram was no longer rotation-symmetrical. In order to overcome this difficulty the posts were replaced by a cylindrical wall of dielectic material. A reflector support of this type is described in publication A454 TBr 5 of the German Post Office Telecommunications Research Institute, January 1969. Such a dielectric support provides, on the one hand, a sufficient rigidity of the support and, on the other, a protection of the antenna components from the influence of the weather. However the use of a dielectric material for this support has the drawback that, due to ultra-violet irradiation, it becomes brittle, owing to which its strength decreases, so that frequent maintenance of the usually difficulty accessible antenna is necessary. Moreover, owing to the change of the dielectric properties of the material, the reflection increased, to the detriment of the quality of the antenna. On the other hand utilization of a wall made of a good conductor for electricity and provided with slots as active elements was known in itself, e.g. from the so-called waveguide slot antennae, in which, however, the wall is the outer conductor of a closed transmission line and, as such, an active current-carrying element. In that case the waves travel lengthwise through the space enclosed by the wall. Moreover, the wall has no supporting function.
{ "pile_set_name": "USPTO Backgrounds" }
Laparoscopic ventral recto(colpo)pexy for rectal prolapse: surgical technique and outcome for 109 patients. The authors propose a new laparoscopic technique for correction of rectal prolapse. The unique feature of this technique is that it avoids any posterolateral dissection of the rectum. The mesh is sutured to the anterior aspect of the rectum to inhibit intussusception. The technique was applied in 109 consecutive patients to correct total rectal prolapse. Conversion was needed for four patients. No postoperative mortality or major morbidity occurred. Minor morbidity was noted for 7% of the patients, and a recurrence rate of 3.66% was observed. Because this technique limited the dissection and the subsequent risk of autonomic nerve damage, a cure comparable with that resulting from classical mesh rectopexy can be anticipated.
{ "pile_set_name": "PubMed Abstracts" }
Pruritic papular eruption of the acquired immunodeficiency syndrome. We report a case of acquired immunodeficiency syndrome with pruritic papular eruption. The patient, a hemophiliac, presented with generalized pruritic, skin-colored papules and nodules. The chronic lesions were excoriated and hyper-pigmented. The eosinophil count was elevated, but IgE was normal. The lesions and pruritus responded only to ultraviolet B phototherapy. While the mechanism is not known, ultraviolet B phototherapy may provide relief of AIDS-related pruritus.
{ "pile_set_name": "PubMed Abstracts" }
[Mental health and solitude in old age]. Mental health and solitude in old age. Elderly people experience solitude as isolation, even more so when the person is ill. However, in the same circumstances, some people see solitude as an experience of maturity. Is it simply a question of inner strength?
{ "pile_set_name": "PubMed Abstracts" }
Q: Print all characters after every 3rd occurrence of comma in oracle I have a string as "12as3,45we6,7we89,101112,131415,3234,1234" and want to write a oracle regex function or a SQL to print all the characters after every 3rd occurrence of comma (,) . So the Output for this should be 12as3,45we6,7we89 101112,131415,3234 1234 I have tried regex but it is only printing the first occurrence. SELECT NVL( SUBSTR('12as3,45we6,7we89,101112,131415,3234,1234', 1, INSTR('12as3,45we6,7we89,101112,131415,3234,1234',',',1,3) -1), '12as3,45we6,7we89,101112,131415,3234,1234') FROM dual; OutPut is 12as3,45we6,7we89 I also tried this but it is printing after every comma. with t as ( select '12as3,45we6,7we89,101112,131415,3234,1234' as str from dual ) select extractvalue(value(x), '/b') x from t, table( xmlsequence( xmltype('<a><b>' || replace(str, ',', '</b><b>') || '</b></a>' ).extract('/*/*') ) ) x / Is there any way without using procedure of function, we can write in a select statement in Oracle. A: Here's one option, which uses a function. The idea is: split input string into rows concatenate its pieces (it is one) by 3 in a group, separated by a comma if it is the 3rd piece (see the MOD function), separate them by the line-feed character (CHR(10)) (it is the splitter) SQL> create or replace function f_split (par_str in varchar2) 2 return varchar2 3 is 4 l_str varchar2(200); 5 begin 6 for cur_r in (select mod(row_number() over (order by null), 3) rn_mod, 7 case when mod(row_number() over (order by null), 3) = 0 then chr(10) 8 else ',' 9 end splitter, 10 regexp_substr(par_str, '[^,]+', 1, level) one 11 from dual 12 connect by level <= regexp_count(par_str, ',') + 1 13 ) 14 loop 15 l_str := l_str || cur_r.one || cur_r.splitter; 16 end loop; 17 18 return (l_str); 19 end; 20 / Function created. SQL> select f_split('12as3,45we6,7we89,101112,131415,3234,1234') result from dual; RESULT -------------------------------------------------------------------------------- 12as3,45we6,7we89 101112,131415,3234 1234, SQL> Why not a simple SQL, which utilizes the same code? Because of this: SQL> with test (col) as 2 (select '12as3,45we6,7we89,101112,131415,3234,1234' from dual), 3 split_me as 4 (select row_number() over (order by null) rn, 5 case when mod(row_number() over (order by null), 3) = 0 then chr(10) 6 else ',' 7 end splitter, 8 regexp_substr(col, '[^,]+', 1, level) one 9 from test 10 connect by level <= regexp_count(col, ',') + 1 11 ) 12 select listagg(one, splitter) within group (order by rn) result 13 from split_me; select listagg(one, splitter) within group (order by rn) result * ERROR at line 12: ORA-30496: Argument should be a constant. SQL> I don't know how to fix that.
{ "pile_set_name": "StackExchange" }
Parkfast Blog Tag: Driving Friday, May 23, 2014 [caption id="attachment_1397" align="aligncenter" width="512"] Anthony Correia / Shutterstock.com[/caption] One of four lanes on the Williamsburg Bridge eastbound to Brooklyn will be closed on Saturday from 6 am to 12:30 pm to facilitate NYCDOT bridge maintenance. Mulberry Street between Canal Street and Broome Street and Hester Street between Mott Street and Baxter Street will be closed Friday, Saturday and Sunday from 5:30 pm to 9 pm for the Little Italy Pedestrian Mall.… Friday, May 9, 2014 The Brooklyn Bridge will be closed Manhattan-bound from midnight Friday to 7 am Saturday and from midnight Saturday to 9 am Sunday. The eastbound BQE exit onto the bridge closes 30 minutes earlier and other Brooklyn ramps onto the bridge shut down 5-15 minutes earlier. Motorists will be detoured to the nearby Manhattan Bridge. One of four lanes of the Williamsburg Bridge eastbound to Brooklyn will be closed on Saturday from… Friday, April 25, 2014 The Brooklyn Bridge will be closed Manhattan-bound from midnight Friday to 7 am Saturday and from midnight Saturday to 9 am Sunday. Motorists will be detoured to the Manhattan Bridge or may choose other crossings. One of four lanes on the Williamsburg Bridge eastbound to Brooklyn will be closed on Saturday from 6 am to 2 pm to facilitate NYCDOT bridge maintenance. The Grand Street Bridge over Newtown Creek will be… Friday, April 18, 2014 The Brooklyn Bridge will be closed Manhattan-bound from midnight Friday to 7 am Saturday. Motorists will be detoured to the Manhattan Bridge or may choose other crossings. One of four lanes on the Williamsburg Bridge eastbound to Brooklyn will be closed on Saturday from 6 am to 2 pm to facilitate NYCDOT bridge maintenance. The Grand Street Bridge over Newtown Creek will be closed on Saturday from 8 am to 1… Fur will be flying on May 3rd when Celebrity Catwalk's "Paws in the City" returns to the Big Apple! This fashion show for pets fuses the worlds of fashion and entertainment into one unforgettable event, with all of the proceeds going to animal rescue organizations. As we've done in the past, Edison ParkFast is proud to support this event. And this year, for the first time ever, we're teaming up with Celebrity Catwalk for a free… Friday, April 4, 2014 The Brooklyn Bridge will be closed Manhattan-bound from 11:59 pm Friday to 6 am Monday. The westbound/southbound BQE exit ramp to Cadman Plaza West also will be closed. BQE exit ramp traffic will be diverted to the Atlantic Avenue exit onto Furman Street. While the Manhattan Bridge remains an alternative for Manhattan-bound traffic, motorists should also consider the Williamsburg Bridge or the Hugh L. Carey Brooklyn Battery Tunnel (MTA-tolled facility) due to… [caption id="attachment_1341" align="alignleft" width="300"] Sirikorn Thamniyom / Shutterstock.com[/caption] Yes motor freaks, it's time to start your engines. Because the 14th Annual New York International Auto Show is pulling back into town. And once again, Edison ParkFast is a proud co-sponsor, so we want to make sure you're ready to roll! Here's everything you need to know: What: 1,000 vehicles plus the latest in tech, safety and innovation in nearly 900,000 sq ft. It's the hottest automotive… Monday, March 31, 2014 The Central Park transverses at 65th Street, 79th Street, 86th Street and 96th Street will each be closed once in the early morning hours during this week for annual scheduled under-deck bridge inspections. Each transverse will be completely closed to traffic, except for emergency vehicles, from 12:01 am until 5:30 am. Only one transverse will be closed at a time, so the adjacent transverses may be used as alternates. [caption id=""… Friday, March 28, 2014 The following streets in Manhattan will be closed on Sunday: 6th Avenue between 51st Street and 55th Street and 51st Street between Madison Avenue and 6th Avenue will be closed from 7:30 am to 9:15 am for the NYC Fire Department Holy Name Society Parade: The following streets will be closed from 2 pm to 5 pm for the Federation of Hellenic Societies of Greater New York Parade: * 5th Avenue… Friday, March 21, 2014 One of four lanes of the Williamsburg Bridge eastbound to Brooklyn will be closed on Saturday from 6 am to 2 pm to facilitate NYCDOT bridge maintenance. One lane in each direction on the Greenpoint Avenue Bridge over Newtown Creek is maintained Saturdays from 7 am to 1 pm to facilitate NYCDOT bridge repairs. One of two lanes on the Union Street Bridge over the Gowanus Canal will be closed northbound…
{ "pile_set_name": "Pile-CC" }
Q: Need a site that will let you create your own html/css template that you can copy and paste to your site? I want to create a site but now I don't have time to create the template so I was wondering if there is a site that will allow me to do what the above question states. I want to have sounds on there, drop menus, etc. I did some googleing but I did not find any particular site. A: This is what you are looking for : http://www.noupe.com/css/50-free-css-x-html-templates.html
{ "pile_set_name": "StackExchange" }
Madrasa El Kacemia Madrasa El Kacemia () is one of the madrasahs of the medina of Tunis, which was constructed during the reign of the Husainid Dynasty. Etymology The madrasa's name is derived from its owner, the saint Al Haj Kacem Ibn Al Haj Ali Ben Youssef Al Jerbi (), a Sheikh who died in 1936 (1355 Hijri). Location The madrasa is located at the Sidi Sridek () mausoleum. History It was inaugurated in 1928 (1347 Hijri) by Muhammad VI al-Habib, who granted Al-Haj Kacem the Order of Glory in appreciation for the construction of this madrasa. Description The madrasa includes a student housing and a Quranic elementary school (kouttab) for children. Bibliography References Kacemia
{ "pile_set_name": "Wikipedia (en)" }
• Liverpool manager aims to push Manchester City all the way • Maurizio Sarri: ‘Aim was to arrive in the last 20 minutes at 0-0’ Jürgen Klopp was blown away by the brilliance of Mohamed Salah’s strike against Chelsea as he urged Liverpool to produce a flawless finish to the Premier League title race. Salah struck an astounding goal 142 seconds after Sadio Mané opened the scoring at Anfield as Liverpool retook a two-point lead over Manchester City with victory against Maurizio Sarri’s side. Klopp was thrilled by what he described as a complete team performance and the buildup to Mané’s 13th goal in 16 games but it was Salah’s emphatic finish past Kepa Arrizabalaga that left him momentarily speechless. Mohamed Salah downs Chelsea and keeps Liverpool ahead of City Read more “It blew me away,” the Liverpool manager said. “I didn’t think anything in that moment but I know I was really happy because I was in line with the ball and maybe I saw first that it would go in. It was a really outstanding finish and I don’t want to minimise that but I loved the first goal, too. I was immediately reminded of the 4-3 against Borussia Dortmund. Hendo instead of Milly and Sadio instead of Dejan, but good team play, good cross, good header. The performance was really good but you need the goals, and we got them.” Salah has 19 league goals, 22 in total, but had been on a barren run by his standards of one goal in 10 games before sealing victory against his former club. Klopp said of the drought: “The answer in football is always work rate and the work rate of all three up front was outstanding. Chelsea is a top team. We treat these games like Champions League games, nothing else, and you cannot defend a team like this without offensive wingers. Everybody uses it. Each top team takes that risk. How the boys worked today was unbelievable. And they got the reward for that. You can get an easy goal from a yard or a shot from 25 yards, a thunderbolt. Outstanding.” Liverpool are only four wins from their first league title since 1990 should City slip up in any of their remaining five matches. Klopp insists the focus is on finishing the season with 97 points and not on what Pep Guardiola’s team produce. Eden Hazard fluffs lines in central role and is eclipsed by Mohamed Salah | Paul Wilson Read more “The biggest challenge for us is always facing the world outside. We play our game. If City lose today, and we find out five minutes before the game, somebody tells us “City lost!” then that is not a help. You lose your focus then. We only try to collect as many points as possible. What is it now, 85? Four games to play: 97. Let’s try. And if that’s enough, then perfect. If not, we cannot change it. And we didn’t lose it here or there or whatever. “Very smart people will come out and say: ‘Yeah, if you would have won against Leicester you would be champions.’ It’s all bullshit. People and idiots bring something like this up. By the way, on this point, we can finally close the slipping book. Robbo slipped and nothing happened, so it’s not a Liverpool thing. Done.” Sarri lamented Chelsea’s slow start to the second half that cost them what he admitted was the plan of keeping the match goalless until the closing stages. The Chelsea manager, who has lost five of his past seven away league games, said: “We were a little bit low defensively at the beginning of the second half but we also defended a bit low at the beginning of the first half. It is not easy to play against Liverpool in that moment. “If we were able to pass the first 10 minutes with the same result, in the last 20-25 minutes we would find a lot of spaces because they needed to win. The target was to arrive in the last 20-25 minutes at 0-0.”
{ "pile_set_name": "OpenWebText2" }
Orihara Orihara (written: 折原 lit. "opportunity field") is a Japanese surname. Notable people with the surname include: , Japanese photographer , Japanese professional wrestler Fictional characters , a character in the light novel series Durarara!! See also Orihara Station, a railway station in Yorii, Saitama Prefecture, Japan Category:Japanese-language surnames
{ "pile_set_name": "Wikipedia (en)" }
Raynham Man Convicted of Molesting Six-Year-Old Girl A 39-year-old Raynham man was given the maximum jail sentence allowable earlier this month after being convicted at trial in Taunton District Court of molesting his girlfriend’s six-year-old daughter, Bristol County District Attorney Thomas M. Quinn III announced today. Damion Paxton was convicted by a jury of his peers of indecent assault and battery of a child under 14, enticing a child under 16, and assault and battery. After his conviction, Judge Michael Brennan sentenced the defendant to the maximum two-and-a-half year in the house of corrections and placed him on supervised GPS-monitored probation for an additional five years after his release from jail. The case dates back to 2013, when the victim was just six-years-old and living in Raynham. The defendant, who lived with them for about two months, would coax the victim into his bedroom by letting her play a video game. He would make her sit on his lap while playing. She testified at trial that the defendant did not play with her, but rather was looking at her and watching her while she playing. While on his lap, he would rub her lower back under her shirt, going down to her waistband area. He also reached over and touched her vaginal area over top of her clothes. She testified that he would also reach over and touch her chest area, near the neck line of her shirt, but would not go inside her shirt. She said these incidences would happen mostly with the door closed and that they would stop when her mother or sister would come into the area. The case was prosecuted by Assistant District Attorney Megan Burns. “This defendant took advantage of his temporary living arrangement to abuse an innocent six-year-old girl. His conduct is despicable and I am pleased Judge Brennan imposed the maximum sentence for this career criminal,” District Attorney Quinn said. “I commend the victim for testifying under very difficult circumstances.”
{ "pile_set_name": "Pile-CC" }
PS3 Attitude’s Most Wanted Games of 2010 #7 – Batman: Arkham Asylum 2 When the votes were cast for this year’s Most Wanted Games of 2010, there were a few titles that were tossed around that many of us probably wouldn’t have even dreamed mentioning a few months ago. During this long and arduous process, over thirty games garnered nominations, but when the dust settled and the arguing stopped, no other game received more knowing nods among the staff here at PS3 Attitude for making a surprise appearance on this list than Batman: Arkham Asylum 2 (though it’s unlikely to retain such a title). It’s a testament to the quality of the first game that word of a sequel got our red phones ringing and rushing to encase ourselves in a cape and leather. From its excellent balance of stealth and action to the fitting use of gadgets and techniques Batman implements to overcome the inhabitants of Gotham’s renown loony-bin, B:AA not only hit a lot of our buttons, it punched them right off our faces. Naturally, considering the game was only announced a couple of weeks ago at the VGAs, little is actually known about Rocksteady’s second caped-crusade with the Dark Knight. In a way, with such little information to currently go on, it only compounds what a great job the guys at Rocksteady did the first time to make us want something we know so practically nothing about. "Bit to the left, left ... left ... there, you got it ..." What we do know is that Arkham is unlikely to be the setting of the sequel, or at least the only setting. With Rocksteady’s Paul Denning confirming that a sand-box Batman title just wouldn’t work, it’s probable that other Gotham landmarks will also make an appearance. Such locales could include the likes of Wayne Manor to the shadowy alleyways that claimed the lives of Bruce’s parents, what we can expect is that, with the success of the first game surely rewarding the Rocksteady crew a bigger budget, things are going to get bigger and, excuse the pun, even batter. Other than the game’s possible locations, the only other thing we have to go on is what was shown at the VGAs. Depicting a sickly – though just as insane as ever – Joker, the Batman 2 teaser at least confirms that Bat’s arch-nemesis is returning. What other villains will make the role-call is anybody’s guess, but no matter who turns up, we’re looking forward to unleashing our brains and our brawn in another stellar action title next year. Here’s the obligatory quote from the team: The original Arkham Asylum is one of the best games of 2009 and is definitely the best superhero game ever created. With the foundation already made, there is no doubt that the sequel will be even better – PS3 Attitude’s Delriach Batman 2 – or whatever it is ultimately called- hits sometime late next year.
{ "pile_set_name": "Pile-CC" }
Measurement of serum total glycerides and free glycerol by high-performance liquid chromatography. Serum levels of total glycerides and free glycerol are important indices of lipid metabolism and cardiovascular disease risk. Convenient enzymatic methods of measurement have been available, but they are susceptible to interference. Situations exist in both research and clinical laboratories in which more specific and precise methods are needed. We developed HPLC methods for the measurement of serum total glycerides and free glycerol. For total glycerides, serum was mixed with an internal standard (1,2,4-butanetriol) and treated with alcoholic sodium hydroxide to hydrolyze glycerides to glycerol. After deproteinization with tungstic acid, the glycerol was benzoylated with an optimized Schotten-Baumann reaction and analyzed by HPLC. For free glycerol, serum was equilibrated with the internal standard and deproteinized with tungstic acid to remove the glycerides. The glycerol was benzoylated and analyzed as for total glycerol. Various factors were investigated, and no significant sources of interference were detected. The total coefficients of variation ranged from 0.7% to 2.0% for total glycerides and from 1.7% to 3.2% for free glycerol. The analytical recoveries ranged from 98.5% to 101.6%. In conclusion, simple and reliable HPLC methods for serum total glycerides and free glycerol have been developed. The methods may also be used for the analyses of glycerol or glycerides in other biological samples.
{ "pile_set_name": "PubMed Abstracts" }
using System; using Waher.Security; namespace Waher.Networking.CoAP.Options { /// <summary> /// Base class for all opaque CoAP options. /// </summary> public abstract class CoapOptionOpaque : CoapOption { private byte[] value; /// <summary> /// Base class for all opaque CoAP options. /// </summary> public CoapOptionOpaque() : base() { } /// <summary> /// Base class for all opaque CoAP options. /// </summary> /// <param name="Value">Opaque option value.</param> public CoapOptionOpaque(byte[] Value) { this.value = Value; } /// <summary> /// Gets the option value. /// </summary> /// <returns>Binary value. Can be null, if option does not have a value.</returns> public override byte[] GetValue() { return this.value; } /// <summary> /// <see cref="object.ToString()"/> /// </summary> public override string ToString() { return base.ToString() + " = " + Hashes.BinaryToString(this.value); } } }
{ "pile_set_name": "Github" }
Exit Sign To Meet ISO 7010 Exit Signs To Meet New ISO 7010 is the latest edition, and is one of the many safety signs required by law. Providing the correct Emergency Escape Signage can be Life Saving, ensuring everyone evacuates the building via the appointed Fire Exits and Emergency Exits. Emergency Escape signage is white on green for ease of identification & legibility. All signs within this section conform to the new ISO 7010 safety standards. Safety signs are required by law in all public areas & buildings. A mixture of ISO 7010 /BS 5499 and EC Directive fire exit signs should never be displayed together within the same building.
{ "pile_set_name": "Pile-CC" }
Q: Best way to have a javascript load only on desktop version of site? I have a javascript (jQuery) that I am running on my WordPress site. I only want the script to load if the screen width is under 1024 pixels. The reason for this is because it has to do with how the top navigation menu functions. I only want this script to load when the screen width is under 1024 pixels, because anything under that is going to have a completely different menu style / functionality. Naturally I have plenty of media queries in my CSS file that change the design at min-width: 1024px. I've found several ways to do this, I'm just trying to determine what the best way to do it would be. Here is a copy of my current javascript file: function accordion_menus(){ // if we are not on mobile (menu icon is hidden) show sub items and bail console.log('debug: start'); if ( jQuery('#primary-navigation .menu-toggle').is(':hidden') ){ console.log('debug: yes, it is hidden'); // show sub menus $('#primary-navigation ul.nav-menu ul.sub-menu').show(); return; } else{ // hide sub menus $('#primary-navigation ul.nav-menu ul.sub-menu').hide(); } // top level nav click function $('#primary-navigation ul.nav-menu > li > a').click(function(e){ // store parent li to variable var parent_li = $(this).parent('li'); // if sub menu does not exist in parent li if ( !$('ul.sub-menu', parent_li).first().length ) { return; } // if sub menu is already active, bail if ( parent_li.hasClass('sub-menu-active') ){ parent_li.find('ul').slideUp(100, function(parent_li){ }); parent_li.removeClass('sub-menu-active'); return false; } // stop link click e.preventDefault(); // store current sub menu in variable var current_submenu = $('ul.sub-menu', parent_li).first(); // slide up non-current sub menus $('#primary-navigation').find('ul.sub-menu').not(current_submenu).slideUp(function(parent_li){ // remove sub-menu-active class from all first level items except current parent li $('#primary-navigation').find('li').not(parent_li).removeClass('sub-menu-active'); }); // slide down current sub menu current_submenu.slideDown(100, function(){ // add sub-menu-active to current parent li parent_li.addClass('sub-menu-active'); }); }); // second level nav click function jQuery('#primary-navigation ul.nav-menu ul.sub-menu > li > a').click(function(e){ // store parent li to variable var parent_li = jQuery(this).parent('li'); // if sub menu does not exist in parent li if ( !jQuery('ul.sub-menu', parent_li).first().length ) { return; } // if sub menu is already active, bail if ( parent_li.hasClass('sub-menu-active') ){ parent_li.find('ul').slideUp(100, function(){ // remove sub-menu-active class from all first level items except current parent li }); parent_li.removeClass('sub-menu-active'); return false; } // stop link click e.preventDefault(); // store current sub menu in variable var current_submenu = jQuery('ul.sub-menu', parent_li).first(); // slide up non-current sub menus jQuery('#primary-navigation ul.nav-menu ul.sub-menu > li > ul.sub-menu').not(current_submenu).slideUp(function(){ // remove sub-menu-active class from all second level items except current parent li jQuery('#primary-navigation ul.nav-menu ul.sub-menu > li').not(parent_li).removeClass('sub-menu-active'); }); // slide down current sub menu current_submenu.slideDown(100, function(){ // add sub-menu-active to current parent li parent_li.addClass('sub-menu-active'); }); }); } // load menu accordion on doc ready jQuery(document).ready(function($) { accordion_menus(); }); // load menu accordion on window resize jQuery(window).resize(function(){ accordion_menus(); }); A: jQuery(document).ready(function(){ function resizeForm(){ var width = (window.innerWidth > 0) ? window.innerWidth : document.documentElement.clientWidth; if(width > 1024){ } else { } } window.onresize = resizeForm; resizeForm(); }); I've used this alot. Will rerun JS on each window resize. If you don't want that, just remove window.onresize = resizeForm;. Should work in all browsers hence the width.innerWidth check.
{ "pile_set_name": "StackExchange" }
699 N.W.2d 704 (2005) 473 Mich. 881-886 People v. St. Pierre. No. 127957. Supreme Court of Michigan. July 26, 2005. SC: 127957, COA: 258855. On order of the Court, the application for leave to appeal the December 27, 2004 order of the Court of Appeals is considered, and it is DENIED, because we are not persuaded that the question presented should be reviewed by this Court.
{ "pile_set_name": "FreeLaw" }
Chalchitra Chalchitra (বাংলা- চালচিত্র) is a part of Bengal Patachitra. It referred to the Debi Chal or Durga chala, the background of the Durga Pratima or idol. Originally, these were used to give a proper proportion to the structure. This tradition is very ancient and is still maintained. Significance of the name Chalchitra is a Bengali word where Chal means covering. It is drawn in Pratima Chala. So, it is called Chalchitra. Patua, the artists of Chalchitra called it as Pata Lekha, means the writing of Patachitra. It is also called Durga Chala, Debi Chala. Classification According to the shape of the Chali, the structure of Durga Pratima it has some varieties like Bangla Chali, Mothchouri Chali, Tanachauri Chali, Sorbosundori Chali, Khep Chali, Markini Chali. Among them, the commonly seen Chali is the Markini Chali. The Bangla Chali follows the tradition of temple architecture. It stretches on both sides of the idol in a suspended pattern and is long enough to fit all the idols present there. Theme and style The main content of the chalchitra is Shib-Parboti, Kail, Shib attending Nandi-Vringi, Mahish-mardini, Dashabatar etc. Such a special Patachitra is seen in Durga Pot in the Hatsarandi Sutradhar society of Birbhum district, which is called Durga Pot. However, instead of Durga idol, it was worshiped in Durga Pot. Durga Pot has a semi-circular Patachitra where Patachitra of Durga is in the middle position. Ram, Sita, Shib, Nandi-Vringi, Brahma, Vishnu, Shumbha-Nishumbha are painted on this kind of Chalchitra. Krishnanager Rajrajeshwari Durga is seen to be uniquely noticed. In the middle of the Chalchitra, there is Panchanan Shib and Parvati is beside him, on one side there is Dasha-mahabidya and the other side, there is Dashabatar. Antiquity Two of the most famous forms of idol making in Bengal are Bishnupur style and Kansanarayan style. Among them, Kangshonarayan style is most popular. 300–400 years old idols of Nabadwip Shakta Rash used Chalchitra as a part of Pratima. At a time, the use of Chalchitra became fade, but now it has a great popularity. Chalchitra artist of Nabadwip, Tapan Bhattacharya said- Tradition Rajrajeshwari Durga Pratima of Krishnanager Rajbari uses a unique Chalchitra. Baishnavadas Mallik of Kolkata's Darpanarayan Tagore Street and the tradition of writing pot in the Bose family of Ramkrishnapur is still fine. Bimanbihari Sheel of Ramchan family in Chorabagan, north Kolkata said- Krishnanagar's Chalchitra artist Biswanath Pal wrote pot in various Banedi families of Kolkata. He said- Technique On the upper surface of the idol, a half-domed bamboo structure was strapped on it, and the width of the cloth was wrapped in a width of thick cloth and the back part of the cloth was folded behind the bamboo structure. When the clayed cloth dried up, it was given a few layers of Chalk Dust. After that, the planned storyline is drawn on it. Colour Natural color is used in color, which is one of the characteristics of the Bengal Patachitra. In general, blue, yellow, green, red, brown, black and white are used in the Chalchitra. Indeed, the painting illustration has been imitated by the Patachitra of Bengal. Chalk dust is used for white color, pauri for yellow color, cultivated indigo for blue,bhushakali for black and mete sindur for red color in chalchitra. See also Patua Patachitra References Category:Bengal Patachitra Category:Culture of West Bengal Category:Shaktism
{ "pile_set_name": "Wikipedia (en)" }
Health and citizenship: the characteristics of 21st century health. Health is at the core of modernity and its governance has been characterised by two expansions: an expansion of the territory of health into an increasing array of personal and political spaces; and an expansion of the do-ability of health. Health is an exemplary area to study the 'consequences of modernity' in all its dimensions and it is inextricably linked to the concept of modern citizenship.
{ "pile_set_name": "PubMed Abstracts" }
ABOUT Avid outdoorsman and underwater photographer, Barry Brown has spent the last 12 years documenting life above and below water in Curacao, Netherlands Antilles. He is currently working with the Smithsonian Institution documenting new Caribbean deep-water species and building a one of a kind database. His underwater images can regularly be seen in Sport Diver, Scuba Diver and on the Ikelite website. His image of a "Collage of Corals" seen under blue-light at night recently placed in the TOP 10 images for the 2014 NANPA (North American Nature Photographers Association) photo contest. Archive for April, 2012 Good morning friends, how was your weekend?? Mine was very uneventful once again, I really didn’t do much as I still felt a bit sick this weekend, it’s like the cold that won’t go away!! Saturday morning Stijn met me and the dogs on the Calabash trail and we cleaned for almost two and a half hours! I had a big push broom and Stijn did the cutting and by the time we left it was looking pretty darn good! After that adventure we were going to go diving but because of the big incoming waves driven by this high wind we are having that never happened. We then attempted to go sea-glass collecting but again conditions were poor and we gave it up! So in the end Stijn just went home because of nothing to do around the Brown household! Yesterday I loaded the bike onto the car and took the dogs for a long bike ride along the North coast. We got there at around 7:00 and by 9:00 it was HOT and time to go! I spent most of yesterday waging war on these small cockroaches that are currently invading our house! I had to pull out some of our driftwood furniture and power wash it outside to get them and their eggs off and then once dry I spayed the furniture with bug killer, it was super fun, NOT!! After hours of moving and cleaning driftwood i then cleaned the inside of the house, it was a great way to spent a Sunday! I am almost packed and ready to go, I leave for the States on Wednesday and will be back in a week but will continue to post the blog everyday while gone, so keep tuning in! Today is one of the biggest holidays of the year for Holland and Curacao it’s called “Queens Day” and thanks to the Queen I have the day off! There will be non-stop celebrations here all day with all the folks from the Netherlands being dressed in orange or should i say covered in orange, they even paint their faces! I might go down to Punda later and check out the big swap-meet they are having I think we went a few years ago and it was pretty fun. Here is a very cute little Orangeclaw Hermit crab, Calcinus tibicen for your viewing pleasure today. This crab is commonly confused with the Red Reef crab but the tiny white speckles on the large claws and the light yellow tips set him apart from his cousin. They guy here was in a very old discarded Queen Conch shell and once again proves that nothing goes to waste underwater. I need to get these three dogs out for a walk then I will go do a dive with Alita the baby dolphin, have a wonderful day, see you tonight, Barry Good morning from the Caribbean. I got to work yesterday just in time to see this little bird giving this bigger bird a piggy-back ride and they looked like they were having a great time, at least the bigger bird did!! Ok, I see I can’t fool you folks, yes these are two mating Laughing Gulls, Larus articilla and the only one laughing here is still the bird on top! They get their name from the cackling sound they make which is unlike any noise I have ever heard. Lately we have this very large school of small fish out in front of the Ocean Encounters dive shop in our small lagoon and it is attracting birds from everywhere lately! These are considered true seabirds and can be found just about anywhere on the island from the shores to the harbour. They feed mainly on fish but are known to eat just about anything including garbage. I read that these birds are known to breed in Bonaire but have never been documented breeding in Curacao, boy do I have a photo for them!! I did a morning dive yesterday on our Sea Aquarium House reef in search of the corals that were badly bleached a year ago. I have a whole set of laminated photos that I carry underwater so i can match the photo up exactly as it was a year ago, it’s amazing to see the before and afters. Many i could not find but did hit the jackpot with quite a few, I can see I won’t get that project done in one dive! Many of the corals that were badly bleached are now all dead while others fully recovered, the grooved brain corals took the biggest hit! At 5:30 I finally got back on the o’l bike and went for a much needed and overdo ride. I have been sick with this stupid cold for close to two weeks and only have ridden twice, we normally ride three times a week with a long ride on the weekends! Hi guys, for the past week we have seen countless flocks of Caribbean Flamingo’s flying East either to Bonaire or to the Jan Thiel Salt-Ponds and unfortunately I never once had a camera with me. I think it was three days ago that a flock of about 150-200 passed out in front of the Sea Aquarium and flying at only about a meter above the waters surface! The group was so large and so loud that it made everyone stop what they were doing and gaze in awe at a sight that only a few will ever be lucky enough to see. I honestly had a hard time believing that these birds because of their size could fly very well but they proved me wrong. They fly in a formation just like wild geese, there is one leader and the rest follow creating a large “V” or in a straight line, it’s really unreal to see. I am guessing that the leader must trade off with others quite often as the others were all more or less drafting him, it would be very tiring at the front. We always see them flying directly into the wind as well, again it seems to tiring but maybe the wind keeps their large bodies afloat or hovering in the air? For centuries Bonaire has been the principal breeding site for the flamingo population in the area which is currently estimated at around 20,000 birds. From what I understand the flamingos come from Venezuela and mainly pass Aruba and Curacao on their way to Bonaire but in the past few years a flock of 300 to 400 have started calling Curacao home and can be found here almost year around. This one here is enjoying some “me time” with a nice bath under the warm Caribbean sun without a care in the World! I was again underwater with Alita the baby dolphin yesterday, that’s about as fun as it gets!! I started out the morning doing some photos above the water of her and her mother playing and will send those out to you as well. Not much else going on, it’s really pretty quiet around her lately. I am off to the ocean, have a wonderful day, be back soon, Barry Good morning from a little place called Curacao. I am waking up fully beat after spending close to four hours underwater yesterday with Ritina and Alita, our new baby dolphin. On my first dive in the morning I was in with them for close to two hours just standing or sitting on the sand waiting for them to come to me, this works so much better than swimming around and trying to find them. The whole time I am down there Ritina is talking to the baby with these high pitched squeals and whistles and the baby is answering back with her own unique calls, it’s really unbelievable to listen to! I have the camera all ready to go with one flash as Ritina brings the baby over to check me out, they usually do a few circles around me and I get a few shots and then off they go and I wait for a few minutes before they return. While waiting I play with the giant Queen Conchs and find all kinds of new and exciting fish to photograph including a tiny little just born Lionfish. I ended up with some great photos yesterday but was forced to exit because my fingers were frozen solid so after warming up for a few hours i jumped in and did it again, talk about fun! Here is a beautiful, cool looking Green Iguana for your viewing pleasure today that looks so much like a prehistoric dinosaur!! The Green Iguana can weigh up to 18 pounds (8 kg) and can reach a length of five to seven feet (1.5 to 2 m). This iguana has a long body covered with soft leathery scales, a long tail and short legs. Its hard, long tail is used as a weapon and for balance when climbing. It has a greenish-gray color and can change color slightly (but not nearly as well as some lizards, such as chameleons). Female and juvenile male iguanas are a much brighter green than an adult male. It has feet with five very long toes with sharp claws on the ends, used especially for climbing. The iguana has a row of spines that extend along its back from the base of its head all the way to the tip of its tail, descending in size from head to tail. It also has a dorsal crest at the base of its head and a dewlap underneath its chin. The iguana also has a row of sharp serrated teeth. The Green Iguana is a social species; groups can be found basking and foraging together in trees. The male iguana is typically more aggressive and territorial than the female. They exhibit male-male aggression and a male may injure another iguana in attempts for the alpha position, the best basking perch, the biggest territory, or access to females. Young males who are not yet ready to challenge mature males for territories may hang out with dominant males but are always watchful for signs of aggression. Good morning everyone…dolphin day AGAIN! This is another one of our super cute little ones. Barry was in the water yesterday with our one year old’s and their mothers, this is little Kanoa, he is almost one and a half and the son of Renata. He also shares the pool with Bonnie and Nubia, who just turned one in April. This is the typical way we see these little ones, racing by and giving us a look backwards. Dolphins of course, have eyes on the side of their heads, and can almost see 360 degrees around them. You might recognize the name Kanoa. He got his name from a beach on the North coast that we often take the dogs to. And, Kanoa is typical of one year old baby dolphins. He is a bit scared, but very curious. So, he races by, but quickly comes back for another look at this man with the camera that he can see his reflection in. Barry and Kanoa had a blast during this photo shoot, and I am sure they will be doing more in the days to come. That’s great because we can see the fun photos afterwards! I believe he will be in the water once again today as it is quite clear these days and getting hot on land! Barry here, good news on the puppy front, we found a home for our puppy Lola!! For those of that forgot we have had a puppy here at the house for quite a few months now well guess what, this lucky dog is going to America!! Yes, in just a few short weeks Aimee will take her all the way to Michigan and back, is that dedication or what?? Many of you remember our friend Emily who has been here over and over she will be her new Momma!! Cool huh!? I will keep you posted and send a new photo, she is now getting very well trained and is cute as can be! Like Aimee mentioned I was in the water a lot yesterday, in fact close to four hours! I first did a sub dive and then off to the baby dolphin lagoons, what better way to spend the afternoon! Here is something else fun for you all today, this is a short little video sent to me by a friend of a very rare Caribbean Two-Spot Octopus, Octopus filosus, that was recently spotted in Bonaire, check it out! http://www.youtube.com/user/lindascubastuff I have never seen one of these in our waters but apparently they exist as we now have proof, talk about well camouflaged!!! It’s off to swim with dolphins and play with the sub, have a wonderful day!! So…who’s smiling now? You cannot see this photo and not smile and not fall in love with this amazing little creature. This photo is exactly Alita’s personality! She is so funny and curious and sassy, all rolled up into one beautiful little package. She is now 5 weeks old and is “her own little dolphin”. It is amazing how fast these little ones become coordinated and how they are always looking above, below and around momma, trying to catch a glimpse of their new world. I get in the water with them every day, to give Ritina some TLC and to make sure everyone looks good and healthy. It also gives Alita a chance to see me often and slowly get used to me. Actually, Alita is very curious about me, but Ritina is still a protective momma and keeps herself between the two of us. The bond between Ritina and I has definitely grown and I love her more everyday as I see her blossem into such a wonderful momma. And, every so often Alita gets very close to me, but I never over-reach my boundry, and that is what makes Ritina relax and let me spend more time up close with them. The idea is not to touch Alita, but to have her come and touch me. Day by day, it will happen. So, to get this photo, Barry set up the camera and in I went! I can’t tell you how much fun that was. The big dome is a bit reflextive and that really got the dolphins interested, so they kept passing by. I did not even know this shot turned out so great, because she was right up in my face, but I was hopeful. So, either Barry has taught me well, or (as I sometimes think), even a blind squirrel can find a nut once in a while! Enjoy every! Fun times in Curacao. Apr 20, 12 Comments Off on American Kestrel, Falco sparverius, Birds of Prey Good morning from Curacao!! Yeah we know that’s a hard word to say, it sounds like, CUR-A-SOW and here on the island you hear it pronounced a hundred different ways. A big Happy Birthday goes out to our friend Nancy Thompson today, we wish her a wonderful and fun filled day!! Well, we got more rain again last night lucky us, it comes at a time when we needed it badly as everything was looking so dry. We are officially entering the dryer months now which is not my favorite time of the year here, I love all the blooming green stuff and it’s amazing just how fast it ALL disappears without moisture! Yesterday I spent the day trying to get some new photos of baby Alita but it’s not as easy as it looks!! If the sun is not shining you can’t see the dolphins under the water at all so you really have no idea where they will surface. When the sun is out you can better follow them with your lens but guessing when and where they will surface for that one shot is still very difficult. I ended up standing out there for hours yesterday shooting around 6gb of film, thank goodness for it’s digital or I would never get a shot! After work yesterday I met Stijn and a friend from Holland named Rolf in front of Lions Dive Hotel and off we went for an hour and a half of fast riding on my trails behind the Sea Aquarium. Rolf is a pro rider and has been here all week training and it was great to get to ride with him at least once. Here is a popular bird in Curacao and we see them almost everywhere we go usually in pairs. This is called an American Kestrel, Falco sparverius and they are amazing hunters! The local Curacao residents call them Kini-Kini and in Dutch they are called Amerikaanse Torenvalk. The males have grey wings while the larger female has a more striped appearance. They eat lizards and small birds and occasionally insects but really nothing is safe with these guys around. Some of you will remember the photo I sent out years ago of a Kestrel eating a small Bananaquit thus their other famous name “the Sparrow Hawk”. This bird is found in great numbers here and in Aruba but strangely enough not in Bonaire??? Anyone who can come up with an answer for that please let me know. Also, one last thing, if I post something with a wrong name or miss-identify something please let me know, I try hard to keep these blogs up to date and accurate, you can even call me on my spelling, I don’t mind!! Good morning friends, here is something a bit different for you all today and I’m sending it because many ask me about lighthouses that are here on the islands. This is called the Willems Toren Lighthouse (also known as Lacre Punt Light) which is located at the Southern tip of the island of Bonaire. It is south of the three sets of slave huts and the salt production facilities on the Southern part of the island. The lighthouse was established in 1837 and is well maintained. The nearby remains of the stone walled keepers house are not in as good condition and so far there are no plans to restore it. This photo was taken about three years ago and if you go there today you find it has been freshly painted and looks quite different. It’s just been announced that the first of the five, and probably Bonaire’s most famous lighthouse, Willemstoren (seen here), is totally renovated and in good working order. In a joint venture between the Public Body of Bonaire, which actually owns the historic landmarks and monuments, and the Rijkswaterstaat, four additional lighthouses or light beacons will be renovated and equipped with the latest in electro-technology. Improvements have also been made to ensure the safety of the personnel tasked with maintenance of the towers. The current schedule of work allows for the remaining four lighthouses–Spelonk, Wecua, Seru Bentana, and Klein Bonaire to be completed by August, 2012. We had a rain storm beyond description here last night and we needed it! It started at around 6:30 and lasted a whole hour flooding everything! We opened the back door and watched as dozens of little frogs came poring out of what we call the “frog hole” located on our back porch, it was so cool! Good evening friends, this was the scene today on the beach next to the Substation and in front of Royal Resorts Hotel. The workers had just finished doing hours of raking and getting the sand on the beach all ready for the arriving guests when this big boy strolled in out of nowhere without a care in the World and wasn’t about to share the beach with anyone else!! This is a big Green Iguana, Iguana Iguana and is the number one most photographed and popular reptiles we have on the island. A fully grown male can reach two meters in length, that’s over six feet long folks! I only had a 16mm lens today so in order for me to get any shot with that lens I had to get close! I slowly bent down and moved in closer and he immediately lifted his head and started moving it up and down warning me to keep my distance. They will bite but it’s their tails you have to watch, they use those like a cowboy uses a whip, it’s unreal to see! After a I finished my photos he slowly walked down the beach and onto the rocks where I am sure he had a cave, he most likely spent the rest of the day laying in the sun and hunting for food. Not much going on today, we had another film crew at the Substation most of the day doing their thing, I just kept out of the way!! Good morning all, meet our friend Emma who was last here about a month ago and I am finally getting around to posting her photo! This lovely 18 year old hails all the way from the country of Sweden. Sweden is roughly the shape and size of California, but has about 9 million people, just about a quarter of the Golden State’s population. It is a land rich in nature, with ten’s of thousands of lakes, stony highlands and rich plains. Well, Emma, her sister and father travel to this warm little island a few times a year to enjoy the diving, the sun and the sea. We asked Emma a few things about herself. Favorite hobbies I love to dance. I’ve been dancing since I was one and a half, so that is something I do as often as I can. I have dance class five days every week, but I would do it even more if I had the time! I also love to hang out with my friends and family and just do anything. Favorite foods The best food in the world, must be my mom’s. She makes the best food ever! But other than that, I love Italian food, cooked in all its different ways! I also love to eat sushi, which I eat several days a week after school. What you love about Curacao What I really love most about the island, is that it feels like home to me. Since we’ve been coming there for seven years now, it feels like coming home. I know everything about the island ( at least a lot) and I know what I like to do there. I can do what I love most, and skip all the things you usually do as a tourist. But I also love the climate, and the nature which is a lot different from Sweden. It is so beautiful there! Favorite things to do in Curacao I love to just lay on the beach and swim. It’s the best thing to lay there in the sun and relax, that is something I never do at home! I also love to walk over to the Dolphin Academy and be with the dolphins. My big dream ever since I was a small kid has been to become a dolphin trainer, and it almost feels like it comes true when I am there. The dolphins are amazing and everyone there is so nice to me and my sister. Another thing I like is to be underwater, either snorkeling or diving. I love to see all the nice fish and corals. And at last, I also like to go in to town, and walk among all the cute, colorful houses! Favorite dolphin trainers in Curacao I think I like most of the trainers, especially George and Aimee and Junior. They have been so nice to us, helping us all these years We have taken dolpin trainer classes at DA, and have learned a lot about the dolphins, the shows and what trainers really do. What you want to do in the future I actually don’t really know what I want to do in the future. All I know is that I want to travel before I continue my upper education. I need a break! And like I said before, I’ve always wanted to work as a dolphin trainer during this break, but I don’t really know for the moment. The dream is still there, but I’ve started to realize that it might be a dream for a reason…. That it is harder than you think to just start working as one! But what I want to study after my break of school, is still undecided. Who your role models are and whyMy role models are my family. But because I am a girl, it is mostly my mom and sister. My mom because she and I are so similar to each other. She helps me with so much, and she knows everything about me. She always understands me. It’s hard to explain in words, but she is the best, and we are very close. She and the rest of my family made me who I am. My sister is also a role model to me because she has always been there for me. She is not only my sister, but also my best friend. Whenever I am sad she cheers me up and whenever I am happy she is happy for me. She is the best sister you could ever wish for and I love her with all my heart. Other places you have visited and what you like about thatOther than Curacao I have been to different cities in Europe, such as Rome, Paris, Nice, Barcelona etc. I’ve also been to Canada and USA – New York. My favorite places are New York and the French Riviera though. New York is a city that has everything, according to me, and it was so fun to be there. The French Riviera is a place that I love because, like Curacao, we have been then for many years – and for some reasons I seem to like those places the most. We always go to the same places and beaches when we are there, and for me that is real vacation. When you can really relax! Your favorite place in SwedenThis question was a hard one, but I think I will say Gothenburg. I like it because it is the second biggest city in Sweden, but is still feels quite small. It is also close to the ocean, which is the best in the summer when you want to go out on an island a warm day! How many languages you speakI speak Swedish fluently but I also speak English quite good and a little French. I’ve read it for 6 years, but it is really hard to speak. I have had countless requests for a photo of a bathing beauty in a bikini in fact, it could be one of my most requested photos! When Emma returns for the next trip we will be doing more photographs with her and her sister and hopefully next time underwater with the dolphins. Good morning friends, how was your weekend?? Mine was weird again due to the fact that i was still a little sick and semi wounded from my last bicycle crash!! On Saturday morning i loaded the bike on the car and drove to the North coast with the dogs, I figured it would be easier to ride than walk with this dumb cut-up knee I am currently sporting. I think we got out there at around 7:15 and by 9:00 it was so blasted hot we had to go!! This was a big reminder that good o’l HOT summer is on the way and future dog walks will have to be done much earlier in the morning, it’s just too much for them! The rest of my Saturday was spent working on my driftwood tree and doing a bit of shopping, I tried hard to just stay home and get over this week long cold. Yesterday, Sunday it was raining when we woke up so I only took the girls for a very short walk near the house and then spent the morning finishing my tree which you can read about in more detail below. This is my newest driftwood creation called the “Divi-Divi tree”. I have been working on this piece now for around two weeks and realized yesterday that I could just keep doing more so I finally told myself to just stop and call it good! I found all the wood on the shores of Saint Joris Bay ( in the background) or floating in the water and no, it was not found in one trip, this took months of walking to find all the right pieces. It measures close to a meter or three feet in length and two feet tall and weighs about 10 pounds. I designed it around the ever popular Divi-Divi trees which are found here on the ABC Islands. These popular trees are know for their wind-blown look and because the wind is always blowing so hard and always from the same direction the trees take on a unique look of their own. Although it’s hard to see in the photo there is an old hummingbird nest in the tree, we took the nest after the babies grew up and flew away and hummingbirds never use the same nest twice. Around the base I used smooth rocks, sea fans, pieces of polished fossil coral, sea-glass and rope to make the bushes, not to mention countless tiny pieces of driftwood to cover and hide the needed screw-holes. What am I going to do with it now?? That’s a good question! Aimee of course has claimed it but then said yesterday it should be on display somewhere so who knows, every-things for sale! Well, it’s coffee time and then off to work, I won’t be able to dive still because of my dumb knee so another weird week at work ahead! Take care, I will see you soon, Barry Good morning everyone. This is one photo that should bring a smile to your face! This is the newest member of Dolphin Academy, Curacao Sea Aquarium. Her name is Alita, and she is the new, one month old baby of Ritina and Copan. She just received her name last week, by voting of the DA staff and trainers. We were looking for an island or Spanish name and her name means “noble”. It fits her because her momma thinks she is a princess. This is a particular miracle for all of us because this is a first time mother. There is usually a very tough learning curve for a new mother with knowing how to guide and nurse a new baby but Ritina knocked this one out of the park! She immediately was a very good guide, helping her swim and turn, and within a few hours was turning and trying to incourage the little one to nurse. We have really never seen anything like it! We are all still pretty much astounded at the natural mothering ability of Ritina. Of course I am particularly proud because Ritina is my primary dolphin, which means I work with her about 80 percent of the time and I am responsible for teaching her new behaviors. Well, that pretty much means I am a grandma! Yea. This photo is from when the baby was 2 weeks old. She is pretty chubby, which means nursing is obviously going well, she has already sluffed her baby skin and has this wonderful color, and she is strong and active, as you can see, jumping and playing. Ritina and Alita have two other dolphins in their same area, Annie and Tela, and Alita can sometimes be seen swimming with Annie, tucked up under her “Auntie” all safe and sound if Ritina needs to take a moment to herself. Mother dolphins are very protective and alert and seldom ever let their calves leave their sides, and Ritina is the same, always ready to keep her precious treasure safe. So, welcome Alita and we hope to have new and fun stories to share with you in the future. Good morning friends, what a weird week I am having!! Not only am I sick with this stupid cold but I fell on my bike in the Sea Aquarium parking lot on my way home and cut the heck out of my leg, again! I already had some nasty, healing road rash from my big ride last weekend and when i wrecked in the parking lot I landed directly on the same wounds and made them even worse! How does one crash in a parking lot on a mountain bike you ask?? Well, like everywhere on the planet when they pour sidewalks they leave a small lip that rises above the asphalt. In our case here that lip is only about two and a half inches tall and if your sick and dizzy and not paying attention you can get stuck in that groove and there’s nothing that can be done about it, you don’t even have time to say your prayers! Not only is this embarrassing beyond belief but landing or falling on cement is about as bad as it gets, there is no cushion factor at all! So now my leg is worse than when I started which will be keeping me out of the water for the weekend. Yesterday i again went into work to get my camera set up but then went back home and went to bed for the rest of the day. I am feeling a bit better today, so far the nose is not running which alone is great news! Here is one of the coolest Caribbean residents and voted “most fun to watch” by divers around the World. We call these Boxfish but their real names are Trunkfish, this one here is a Smooth Trunkfish, Lactophrys trigueter. They claim these fish can get to be a foot in length, I have never seen one that big but am still looking. This one here was about as relaxed and calm as a fish can be and fully entertained me for over 30 minutes! I just hovered a few feet above the reef and watched as he tried and tried to eat a Christmas Tree Worm but the worm was too fast. After several attempts he then put his mouth over the hole where the worm went down into and I presume started trying to suck it out with those big lips, not sure if he ever succeeded but I think he may have because of the time he spent there. I always tell divers, when you go out find a trunkfisk and just allow yourself five minutes to observe what they are doing, they are very entertaining and cute as cute can be! Good morning from sickville. Still fighting this stupid cold but did go into work twice yesterday to help with the photos. I have been teaching our new colleague Tico to take underwater photos for the past few months and yesterday he jumped in and did my job of taking pictures underwater of the sub. I waited for him at the surface as he went and did his thing and once back i took the camera, rinsed it and took it inside to download the pictures and get them ready for the clients, he did a pretty good job. I was thinking yesterday, and yes it hurt, that we are all teaching Tico our jobs which will make him our most valuable employee down the road!! Here is an animal we really don’t see that much here in Curacao and I think I have only ever seen two. This is called a Goldspotted Eel, Myrichthys ocellatus and are commonly confused as underwater snakes. We have NO snakes in the waters of the Caribbean which is a comforting relief as most species are very poisonous. These beautiful eels have bright yellow-gold spots with diffuse black borders on the body and head and a thin body plus, get this, they are able to crawl or move beneath the sand, maybe that’s why I never see them?? They usually hide during the day in sand or on shallow patch reefs, but occasionally out in the open. Generally these eels come out to forage at night but as you can see here this one is out during the day with no fear at all. The maximum size for this species is around 3 and a half feet in length, that’s pretty long and can be found in the 5-40 foot zone on the reef. That’s it for today, I am going back to bed!! Have a wonderful day, Barry Apr 11, 12 Comments Off on Coral Bleaching Before and After Photos, Brain Coral November 18th 2010 Worst Coral Bleaching Ever! February 12th 2011, Coral Fighting to Recover. March 2012 Good morning from sickville! I have the worst cold ever and am sitting here wondering who is to blame for this?? I have been around sick people for the past week so i guess trying to put the blame on one specific person is never going to happen although it sure would make me feel better. I came home from work at noon yesterday and spent the rest of the day in bed and for sure won’t be going in today! Here is a long overdo photo that I have been meaning to send. If you remember way back in November of 2010 during the worst Coral Bleaching event ever I sent you a photo of a big colony of Grooved Brain Coral that was completely bleached and dying. The middle photo was taken in February of 2011 and as you can see the corals were really fighting to come back but the water temperatures just were not changing fast enough. The bottom photo is the same colony taken a few weeks ago, talk about a major difference?? The Grooved Brain Corals took the biggest hit of all the corals and proved to be the most sensitive to coral bleaching and most did not recover! As I swim around the reefs here I still see dead colonies of Grooved Brain Coral everywhere that is now just a reminder of what can and will happen again if the seas become too warm or if we get another big season of rainfall. As you can see in the bottom picture not all the coral survived the severe coral bleaching and the spots where coral used to be is now patch’s of algae. The algae is also due to these little Damselfish that kill parts of the live coral so algae will form creating a kind of “algae garden” known as “destructive Damselfish Gardens”. The top photo really looks lke a face, you can see the eye, big nose and the mouth but as the coral grew back the face kind of dissapeared. You can also see a Lionfish in the photo on the right side of the coral head, these fish are really everywhere now so many in fact that over 1000 were caught this Sunday at a local Lionfish derby held here in Curacao at Santa Cruz bay. So far the waters in Curacao are still cold meaning no coral bleaching to this date, the reefs are still trying to recover from the last round in 2010.
{ "pile_set_name": "Pile-CC" }
Issues in Internet survey research among cancer patients. Considering the increasing number of cancer patients who are online, it is clear that the Internet will provide an important research medium and/or setting for oncology nurses in the near future. Despite increasing Internet usage in nursing research and practice, issues in using the Internet among cancer patients as a research tool have rarely been explored and discussed. The purpose of the article is to propose future directions for Internet research among cancer patients based on discussions of practical issues raised in an Internet survey study among 40 online cancer patients. The issues raised through the research process include (a) ethical issues, (b) recruitment issues, (c) issues in Web site development and maintenance, and (d) data entry and analysis issues. On the basis of the discussions of these issues, some future directions for Internet survey studies are proposed, including dealing with ethical issues, getting computer expertise, using motivational strategies, and using national and international approaches.
{ "pile_set_name": "PubMed Abstracts" }
With the development of electronic technologies, power conversion frequencies are higher and higher, and when the power switch tube is used to turn on or off a circuit, a manner of using a driver chip to directly drive a power switch tube poses high loss to the driver chip. The driver chip may use a rectangular wave to drive the power switch tube. FIG. 1A is a schematic diagram of using a driver chip to drive a power switch tube, where an output end of the driver chip and the gate of the power switch tube are connected; and FIG. 1B is a waveform chart of a drive signal that is input by the power switch tube, where the driver chip has high loss and low reliability, which are disadvantageous for improving power conversion frequencies.
{ "pile_set_name": "USPTO Backgrounds" }
The name Allah Bux has for long been mistreated on both sides of the border. Allah Bux Soomro, the man who stood for righteousness and advocated secularism, still remains an unsung hero. The prime minister of Sindh during the Quit India Movement of 1942 and the founder of the Ittehad Party, he was one of the first people to vehemently oppose the two-nation theory. It was Allah's vision of a joint and worldly India that dissuaded the Muslim League from spreading its influence in Sindh. He opposed the Muslim League's proposition of the two-nation theory on the basis of 'religion'. Allah Bux Soomro believed in a united India, where heritage belonged to both Hindus and Muslims together. Because of his status as a popular leader, he mobilised many Muslims in support of his one-nation theory. In 1942, he renounced his Knighthood and the title of Khan Bahadur, which was conferred on him by the British Raj. His nationalistic stance even led to his removal from the post of the 'Premier' of Sindh. On 14th May, 1943, Allah Bux Soomro was assassinated by four men, while he was travelling in a tonga in Shaikarpur. 73 years later, his case still remains unsolved, but it's rumoured that his murder was carried out by members of the Muslim League. Sadly, Soomro never found any support from either the Indian National Congress or the Muslim League, both detesting his 'single unified nation' views. Carnage ensued soon after his death, which resulted in the partition. If only people had paid heed to his vision, things would have been different.
{ "pile_set_name": "OpenWebText2" }
! RUN: %S/test_errors.sh %s %t %f18 ! Extended derived types module m1 type :: t1 integer :: x !ERROR: Component 'x' is already declared in this derived type real :: x end type end module m2 type :: t1 integer :: i end type type, extends(t1) :: t2 !ERROR: Component 'i' is already declared in a parent of this derived type integer :: i end type end module m3 type :: t1 end type type, extends(t1) :: t2 integer :: i !ERROR: 't1' is a parent type of this type and so cannot be a component real :: t1 end type type :: t3 end type type, extends(t3) :: t4 end type type, extends(t4) :: t5 !ERROR: 't3' is a parent type of this type and so cannot be a component real :: t3 end type end module m4 type :: t1 integer :: t1 end type !ERROR: Type cannot be extended as it has a component named 't1' type, extends(t1) :: t2 end type end module m5 type :: t1 integer :: t2 end type type, extends(t1) :: t2 end type !ERROR: Type cannot be extended as it has a component named 't2' type, extends(t2) :: t3 end type end module m6 ! t1 can be extended if it is known as anything but t3 type :: t1 integer :: t3 end type type, extends(t1) :: t2 end type end subroutine s6 use :: m6, only: t3 => t1 !ERROR: Type cannot be extended as it has a component named 't3' type, extends(t3) :: t4 end type end subroutine r6 use :: m6, only: t5 => t1 type, extends(t5) :: t6 end type end module m7 type, private :: t1 integer :: i1 end type type, extends(t1) :: t2 integer :: i2 integer, private :: i3 end type end subroutine s7 use m7 type(t2) :: x integer :: j j = x%i2 !ERROR: PRIVATE component 'i3' is only accessible within module 'm7' j = x%i3 !ERROR: PRIVATE component 't1' is only accessible within module 'm7' j = x%t1%i1 end ! 7.5.4.8(2) module m8 type :: t integer :: i1 integer, private :: i2 end type type(t) :: y integer :: a(1) contains subroutine s0 type(t) :: x x = t(i1=2, i2=5) !OK end subroutine s1 a = [y%i2] !OK end subroutine end subroutine s8 use m8 type(t) :: x !ERROR: PRIVATE component 'i2' is only accessible within module 'm8' x = t(2, 5) !ERROR: PRIVATE component 'i2' is only accessible within module 'm8' x = t(i1=2, i2=5) !ERROR: PRIVATE component 'i2' is only accessible within module 'm8' a = [y%i2] end ! 7.5.4.8(2) module m9 interface module subroutine s() end subroutine end interface type :: t integer :: i1 integer, private :: i2 end type end submodule(m9) sm8 contains module subroutine s type(t) :: x x = t(i1=2, i2=5) !OK end end
{ "pile_set_name": "Github" }
The invention relates to luminescence spectroscopy and in particular to spectrofluorimeters for measuring in terms of wavelength the luminescence emitted by sample specimens including measurements of fluorescence and phosphorescence. Luminescence spectroscopy has found wide acceptance for both qualitative and quantitative measurements of a wide variety of materials including drugs and other pharmaceuticals, biochemical and biological materials and organic and inorganic substances. For example, clinical analyses employ fluorescence methods for determination of steroids, estrogens, catecholamines, nucleic acids, enzymes and proteins. Pharmaceutical applications include measurement of aspirin in blood and riboflavin and other medicines. Organic substances in general can often be characterized by fluorescence measurements and there are numerous applications in industries as diverse as tobacco, beer, detergent, printing, oil and insecticides. The present invention relates to spectrofluorimeters in which light from a source with a continuous spectrum is passed through an excitation monochromator and used to excite a fluorescence sample. Light emitted from the sample is passed through an emission monochromator and subsequently detected. By using a scanning spectrofluorimeter in which the wavelengths transmitted by both the excitation monochromator and emission monochromator is variable, it is possible to examine both emission and excitation spectra. With emission spectra the wavelength of the exciting radiation is maintained constant and measurements on the emitted radiation are carried out at varying wavelengths. With excitation spectra the wavelength of the detected radiation is maintained constant while the wavelength of the exciting radiation is varied. The sensitivity and selectivity of emission measurements in luminescence spectroscopy is several orders of magnitude higher than conventional absorption spectroscopy measurements. In existing instruments, D.C. methods of detection limit the maximum sensitivity obtainable because of shot noise, etc. Furthermore, optical systems using lenses and non-achromatic mirrors together with the absence of any device to monitor and correct for fluctuations in excitation beam intensities (for both time and wavelength), do not allow accurate excitation and emission spectra to be recorded because of inherent instrumental defects. The preferred embodiment described here has exceptional sensitivity and selectivity and provides corrected excitation spectra and emission spectra which may be corrected easily with the use of a standard light source. The high sensitivity of the instrument allows low excitation beam light levels to be used thereby avoiding sample photodecomposition. It is an object of the present invention to provide an improved sensitive spectrofluorimeter capable of measuring both emission and excitation spectra.
{ "pile_set_name": "USPTO Backgrounds" }
Q: Can I use React.Fragment for list rendering while have the "key" assigned? Can I use React.Fragment inside the list rendering and assign a key to this 'Fragment' parent? I'm trying to build a projects list layout using css grid, which requires all the elements is direct child of the container. Let's say the desired result will be look something like this. <div className="container"> <img src="imgPathFor1stProject"> <h1>title for 1st project</h1> <p>description for 1st project</p> <img src="imgPathFor2ndProject"> <h1>title for 2nd project</h1> <p>description for 2nd project</p> ... </div> But we all know the list render requires to return a single enclosing tag which we can tackle by using React.Fragment. Then the jsx will look like this: projects.map(project => ( <> <img src={project.imagePath}/> <h1>{project.title}</h2> <p>{project.description}</p> </> )); But here comes the problem, I can't assign a key to each child of the list since there's no actual element that wrapping all these elements. I tried do: < key={project.id}> and <React.Fragment key={project.id}>, both doesn't work. Is there a way to solve this? I still want to apply display:grid on .container element. Thanks! A: https://reactjs.org/docs/fragments.html Keyed Fragments Fragments declared with the explicit syntax may have keys. A use case for this is mapping a collection to an array of fragments — for example, to create a description list: function Glossary(props) { return ( <dl> {props.items.map(item => ( // Without the `key`, React will fire a key warning <React.Fragment key={item.id}> <dt>{item.term}</dt> <dd>{item.description}</dd> </React.Fragment> ))} </dl> ); }
{ "pile_set_name": "StackExchange" }
Which player led the league in meaningless receiving yards last year? Wait, what are meaningless receiving yards? I am defining a meaningless receiving yard as one where: On third or fourth down, a player gained fewer yards than necessary for the first down. The receiving yard(s) came in a loss and when the player’s team trailed by at least 28 points. The receiving yard(s) came in a loss and when the player’s team trailed by at least 21 points with fewer than 15 minutes remaining. The receiving yard(s) came in a loss and when the player’s team trailed by at least 14 points with fewer than 8 minutes remaining. The receiving yard(s) came in a loss and when the player’s team trailed by at least 9 points with fewer than 3 minutes remaining. This definition is not perfect — Le’Veon Bell had a 29-yard reception on 3rd-and-30 last season against the Patriots, and then rushed for a first down on 4th-and-1 — but I think it gets us close enough to perfect that I feel comfortable using it. The results aren’t too surprising — two Jaguars ranked in the top three, separated by the player who led the league in receiving yards — but that doesn’t have to be the end of the analysis. Cecil Shorts led the league with 351 meaningless receiving yards, which accounts for 45% of all of Shorts’ yards last season. That might lead you to think that Shorts’ 777 receiving yards were misleading or inflated because they came against soft defenses. However, 45% of Shorts’ targets last season came in meaningless situations, too. So there’s reason to think his gross number of yards last year isn’t misleading at all, and he wasn’t taking advantage of soft defenses — he just had lots of opportunities against them.1 The table below shows all players with at least 100 meaningless receiving yards from 2013, along with their number of total receiving yards, percentage of receiving yards that were meaningless, meaningless targets, total targets, and meaningless target percentage. Josh Gordon’s line is interesting. While he was second in the league with 282 meaningless receiving yards, that represented only 17.1% of his total receiving yards. Meanwhile, nearly 28% of his targets came in these meaningless situations. Let’s take a game-by-game look at Gordon’s stat line: Wk Opp Yards Tar Mean Yd Mean Tar 3 MIN 146 19 5 5 4 CIN 71 9 0 2 5 BUF 86 6 0 0 6 DET 126 9 0 0 7 GNB 21 6 14 4 8 KAN 132 10 0 1 9 BAL 44 7 17 3 11 CIN 125 15 0 7 12 PIT 237 17 158 8 13 JAX 261 15 0 1 14 NWE 151 10 4 1 15 CHI 67 10 43 4 16 NYJ 97 16 6 4 17 PIT 82 10 35 4 Total 1646 159 282 44 In the final 7 minutes of the Steelers game, Gordon caught 7 of 8 targets for 158 yards and a touchdown. At no point during that stretch were the Browns ever down by less than 16 points. I’m okay saying that Gordon racked up some garbage time yards there. But the amazing part is how infrequently Gordon piled up meaningless yards. In only two other games did he top 20 meaningless receiving yards, and in neither of those games did he hit the 50-yard mark. On the contrary, against the Bengals (in week 11) and Vikings, Gordon had 12 meaningless targets for 5 yards and 34 meaningful targets for 271 yards. While Gordon was putting up numbers for a bad team that passed a ton while trailing, I wouldn’t discount his numbers because of the game situation (you would, of course, discount his numbers because of the sheer volume of passes attempted by Browns quarterbacks). Another player with Gordon-like metrics was Washington’s Pierre Garcon. It’s easy to dismiss his league-leading 113 catches as the by-product of playing for a 3-13 team. But Garcon wasn’t racking up the yards in garbage time: despite often playing in meaningless situations, only 15% of his receiving yards came then, compared to 29% of his targets. Assuming Robert Griffin III and company are improved in 2014, this provides some evidence that Garcon’s numbers won’t necessarily decline as his team gets more competitive (his numbers still could decline, of course, due to a decrease in overall pass attempts or well, any other reason). Update: How’s this for incredible? I have Calvin Johnson down for only two meaningless receiving yards the entire season. Those came on this third 3rd-and-5 completion against Arizona in week two. I acknowledge that “targets” is not the best way to measure opportunities; the ideal metric to use would be snap counts on pass plays or pass routes, but my resources are limited. Why does this matter? It’s possible that soft defenses could have resulted in more targets for Shorts, too. If, for example, 35% of his passing routes came in meaningless situations and that’s when he got 45% of his targets and 45% of his yards, I’d argue that he was benefiting from soft coverage. On the other hand, if 55% of his pass snaps came in meaningless situations, but that’s when he only got 45% of his yards, well perhaps he has Randy Moss syndrome and checked out of those games (or his teammates tended to do better in these situations, decreasing his number of targets). I also recognize that the idea of an 8-yard meaningless catch on 3rd-and-12 is a bit clunky when applied to the concept of a meaningless target or a meaningless snap in that situation. [↩] Did Calvin Johnson not break your threshold of 100 meaningless yards? He isn’t on the list. Ian I would imagine so. Detroit didn’t suffer many double-digit losses, and he didn’t even play in one of them. And he’s not really the kind of receiver you would throw to short of the sticks. Chase Stuart Great question. I’ve updated the post. James Scanning the list only three players had a higher percentage of receiving yards than targets: Chris Ogboynna, Trent Richardson, and Chris Johnson. Checking down to a RB in a desparate situation has to be the definition of a meaningless pass. Edward This might be a crazy request, but is it possible to see the entirety of the list? MattR Why did you limit meaningless receiving yards to players on the losing team? It seems that if a player’s team is winning by 17 with 6 minutes to go (for example), any receiving yards he gains after that point on the way to his teams’s victory are just as meaningless as those of a player on the losing side of that game. Using the Super Bowl as an example, it seems weird that Demarius Thomas’s touchdown reception to cut the game from 36-0 to 36-8 at the end of the 3rd quarter is considered meaningless but all the Seattle receptions on the ensuing possession, including Doug Baldwin’s touchdown reception that increased Seattle’s lead from 28 to 35, are not meaningless (especially since if Denver had managed to recover the onside kick and passed their way down the field for another TD to cut the lead to 21 all those yards would have been counted as meaningless) http://www.sports-central.org/sports/nfl/ Brad O. Interesting stuff. I would love to see this same method applied to QBs.
{ "pile_set_name": "Pile-CC" }
A Perioperative Medicine Model for Population Health: An Integrated Approach for an Evolving Clinical Science. Health care delivery in the United States continues to balance on the tight rope that connects its transition from volume to value. Value in economic terms can be defined as the amount something exceeds its commodity price and is determined by extraordinary reputation, quality, and/or service, whereas its destruction can be a consequence of poor management, unfavorable policy, decreased demand, and/or increased competition. Going forward, payment for health care delivery will increasingly be based on services that contribute to improvements in individual and/or population health value, and funds to pay for health care delivery will become increasingly vulnerable to competitive market forces. Therefore, a sustainable population health strategy needs to be comprehensive and thus include perioperative medicine as an essential component of the complete cycle of patient-centered care. We describe a multidisciplinary integrated program to support perioperative medicine services that are integral to a comprehensive population health strategy.
{ "pile_set_name": "PubMed Abstracts" }
Com o imposto do sol, a casa da direita poderia pagar mais (pela tarde). J. M. "Hoje nos cobram pelo sol, amanhã pelo ar que respiramos.” Assim, indignada, é a resposta de António Frias, presidente da Associação Nacional de Proprietários de Portugal (ANP), depois que entrou em vigor a revisão cadastral com o chamado “imposto do sol”. O Governo socialista aprovou uma revisão dos valores cadastrais dos imóveis na qual a “localização e operacionalidade relativas” têm um peso de 20%. Sob esse eufemismo se abriga uma revalorização da propriedade em função do sol que recebe e de sua qualidade ambiental. Nos indicadores da tabela de valorização de imóveis são contemplados outros fatores, como a existência de elevador, climatização central e garagem. No entanto, a grande novidade é o imposto do sol, pois passa de um peso máximo de 5% para 20%, cinco vezes mais que, por exemplo, uma piscina privada na casa ou sete vezes mais que uma quadra de tênis. A novidade causou indignação aos agentes imobiliários, por um lado, porque vai representar uma elevação do Imposto municipal sobre Imóveis (IMI, em Portugal), mas também porque o fator solar é muito subjetivo. Vai se pagar mais em função das horas em que há sol na casa? E se estiver nublado o ano inteiro? E se uma árvore me tira a luz? É o que considera a Associação de Profissionais e Empresas de Mediação Imobiliária de Portugal (APEMIP), que vê uma maior complexidade e subjetividade nas perícias. A nova tabela está em vigor desde agosto para toda residência nova e após a revisão cadastral na moradia já existente –uma reavaliação realizada pelos municípios a cada três anos, e que é uma de suas principais fontes de receita. "Era inevitável que esses cérebros que inventam essas alterações acabassem por taxar o sol que temos" O presidente da Associação Lisboeta de Proprietários (ALP), Menezes Leitão, qualificou de “gravíssima” a alteração “porque vai gerar valores insuportáveis”. “A ideia de tributar um patrimônio já é por si só gravíssima porque pode ser que o patrimônio não gere nenhum rendimento por ser a moradia habitual do contribuinte”. Segundo Menezes, com a revisão do valor cadastral, sobre o qual se aplica o IMI da residência, passa a ser “praticamente impossível que a maioria das pessoas tenha um imóvel”. Um país muito ensolarado "Era inevitável que esses cérebros que inventam essas alterações acabassem por taxar o sol que temos”, diz Antônio Frias, o presidente da ANP. “Portugal é um país com sol 365 dias do ano e, portanto, acharam que daí se podia aumentar a arrecadação fiscal.” "Todas as casas em Portugal têm exposição ao sol porque somos um país meridional e o sol é abundante. Tudo indica que a fase seguinte vai ser taxar o oxigênio que as pessoas respiram.” Ele se pergunta “o que é uma boa vista? Pode haver valorização se há uma estação de metrô perto, mas a exposição solar é algo absurdo.” A nova avaliação dos imóveis não chega sozinha. Os novos orçamentos contemplam um novo imposto imobiliário para taxar o patrimônio imobiliário que supere os 600.000 euros (2,16 milhões de reais), o que também tem provocado protestos do setor, que, graças ao turismo estrangeiro, vive um boom imobiliário sem precedentes, sobretudo em Lisboa e linha marítima até o Estoril e Cascais.
{ "pile_set_name": "OpenWebText2" }
Abstract We describe the fabrication of three-dimensional tissue constructs using a magnetic force-based tissue engineering technique, in which cellular organization is controlled by magnetic force. Target cells were labeled with magnetite cationic liposomes (MCLs) so that the MCL-labeled cells could be manipulated by applying a magnetic field. Line patterning of human umbilical vein endothelial cells (HUVECs) labeled with MCLs was successfully created on monolayer cells or skin tissues using a magnetic concentrator device. Multilayered cell sheets were also inducible on a culture surface by accumulating MCL-labeled cells under a uniform magnetic force. Based on these results, we attempted to construct a complex multilayered myoblast C2C12 cell sheet. Here, patterned HUVECs were embedded by alternating the processes of magnetic accumulation of C2C12 cells for cell layer formation and magnetic patterning of HUVECs on the cell layers. This technique may be applicable for the fabrication of complex tissue architectures required in tissue engineering.
{ "pile_set_name": "Pile-CC" }
Cute College Boy From Argentina Taking Three Black Flag ... URL: http://www.blackmachines.net/pics/college-boy-from-Argentina/index.html?nats=MjMzNjo0OjMy,0,0,0, :: BLACK MACHINES :: All models are over 18 year old. All records are kept in compliance with the requirements of US law, Title 18 U.S.C. 2257 Niches: Gay Studs, Gays Site:Black Machines White College Boy Joins Three Black Studs Outdoors To Suck ... URL: http://www.blackmachines.net/black-men-outdoors/index.html?nats=MjMzNjo0OjMy,0,0,0, :: BLACK MACHINES :: All models are over 18 year old. All records are kept in compliance with the requirements of US law, Title 18 U.S.C. 2257 Niches: Gay Studs, Gays Site:Black Machines ... Probed Deep By Big Black Cock In This Interracial Hardcore ... URL: http://fuckmeblack.com/TGP/Sisi/index.cgi?sid=1501340 ... gallery by John E Depth Hot Latina SISI probed by big black cock in this interracia sex gallery by John E Depth Is a real ... skills as well as her sex drive was crazy ...Sisi plays the role of a college girl who has been cutting class to go lounge in the... ... Niches: Hardcore, Milfs, Amateurs, Interracial, Americans Site: Fuck Me Black A sexy Euro slut takes a massive black cock up her ass hereURL: http://galleries.pimproll.com/wwbc/vids/253/index.html?p=pt&r=pimp10515&c=0&j=13 ... Cock Presents: Victoria Sin She's a gorgeous euro slut willing to try anything (or anyone) once. So, when her husband brings home an old college friend, she's definitely game. See it all hang out as she entices this homie by not wearing any panties, and ... Niches: Hardcore, Wifes, Milfs, Amateurs, Interracial, Americans, Home Made Site: Wife Wants Black Cock College Boys Paid To Be In A Circle Jerk SessionURL: http://www.straightboygalleries.com/galleries/brokecollegeboys/videos/48/index.php?nats= ... Broke College Boys: Study Hard! This text will be replaced Click on image to Play Video #1 Circle Jerk This is one barbecue you ... 3 Circle Jerk As we talked about summer break I mentioned Black Beach and that it is a nudist beach and of course Tyler states ... Niches: Gay Twinks, Gay Studs, Gays, Gays Site: Broke College Boys For Search feature please to enable JavaScript or to put this site in Trusted Sites zone in your browser Parents please protect your kids from accessing porn by simply using your browser's surfing preferences. All models appearing on this site are 18 years or older. For 2257 related inquiries please contact each gallery site owner individually. We do not produce pornographic content ourselves. Reproduction of our site design, as well as part or totality of our links is prohibited. Abuse email
{ "pile_set_name": "Pile-CC" }
Dynamic Simulation Beck Engineering simulates the cumulative effects of repeated dynamic loading by blasts, seismic events and earthquakes on stability, damage and deformation of built structures and excavations. We use 3d, strain softening geological models, incorporating built structures, discontinuities, ground reinforcement, and high resolution geology models to simulate the effects of measured or synthetic strong ground motions. Vectors of peak particle velocity induced by a blasting event near a large underground infrastructure excavation Our multi-scale, high resolution approach focuses on spectral similitude – matching the expected energy contained across a broad range of frequencies. Coupled with the best of discontinuum and continuum approaches this represents best feasible analysis for these class of problems.
{ "pile_set_name": "Pile-CC" }
Our mission at the Minnesota Department of Human Services is to actively recruit, welcome and support a workforce that is diverse and inclusive of people who are underrepresented in the development of state policies, programs and practices, so that we can support the success and growth of all people who call Minnesota home. HS employs a highly talented and dedicated workforce committed to providing services that produce positive outcomes for clients in a cost-effective manner. Employees have an opportunity to make a difference in the lives of Minnesotans every day.
{ "pile_set_name": "Pile-CC" }
Gene Editing in Sorghum Through Agrobacterium. The application of CRISPR/Cas to introduce targeted genomic edits is powering research and discovery across the genetic frontier. Applying CRISPR/Cas in sorghum can facilitate the study of gene function and unlock our understanding of this robust crop that serves as a staple for some of the most food insecure regions on the planet. When paired with recent advances in sorghum tissue culture and Agrobacteria technology, CRISPR/Cas can be used to introduce desirable changes and natural genetic variations directly into agriculturally relevant sorghum lines facilitating product development. This chapter describes CRISPR/Cas gene editing and provides high-level strategies and expectations for applying this technology using Agrobacterium in sorghum.
{ "pile_set_name": "PubMed Abstracts" }
Transfusion requirements in 811 patients during and after cardiac surgery: a prospective observational study. To identify patients at risk for intra- and postoperative blood product transfusion in a mixed adult cardiac surgical patient population. A prospective, observational study. A single-center university hospital. Patients (n = 811) undergoing cardiac surgery from January 1, 2008, to November 30, 2008. The outcome in terms of transfusion of red blood cells (RBCs), fresh frozen plasma (FFP), and/or pooled platelets within the first 24 hours after surgery was studied. Pre- and perioperative risk factors for bleeding and transfusion of blood products were studied. The majority of RBCs and FFP (>70%) were given to a minority of patients (<12%). The type of surgical procedure, previous cardiac surgery, and emergency operations were all significantly associated with the transfusion of RBCs, FFP, and platelets. Antithrombotic therapy was not significantly associated with the transfusion requirement in the mixed group of cardiac patients. However, in the low-risk procedures such as coronary artery bypass graft surgery, ongoing antithrombotic therapy at the time of the operation significantly increased the risk of transfusion in this otherwise low-risk category of surgery. The identification of high-risk patients is necessary to optimize the perioperative management of bleeding complications. Because of the high variability in transfusion requirements, a specifically tailored patient intervention based on the individual's risk profile appears more likely to improve patient outcome compared with general interventions given to the entire patient group.
{ "pile_set_name": "PubMed Abstracts" }
Q: Onbeforeunload event support on iPad Is onbeforeunload event supported on iPad Safari ? If no, is there any alternate way to detect window closing on iPad ? Please help. A: This has been discussed previously here, and there are is some anecdotal evidence to say that it does work in some circumstances.
{ "pile_set_name": "StackExchange" }
Supramolecular control over the structural organization of a second-order NLO-active organogelator. A study of the structural parameters which govern the supramolecular organization of an organogelator built from the Disperse Red moiety is proposed. In particular, the key balance between intermolecular H-bonding and/or π-π interactions is addressed by comparing the effect of a secondary amide vs. an ester linker within the molecular structure. Solution 1H-NMR studies show the superiority of the former interaction in promoting the nanostructuring process, allowing it to reach a gel state in toluene. The nanostructures obtained from both the amide and the ester derivatives were also studied in the solid state. In particular, the use of second-harmonic generation microscopy demonstrates that an anisotropic organization of the material can even be observed in the case of the ester derivative, which demonstrates the efficiency of the tris(alkoxy)benzene unit in directing the self-assembly process, independently of additional H-bond interactions.
{ "pile_set_name": "PubMed Abstracts" }
SALEM, Mass. (AP) — A Massachusetts man who faced life in prison if convicted of first-degree murder in the killing of his estranged wife’s lover has walked out of court a free man after a Salem judge declared him not guilty mid-trial on Tuesday. Essex County Superior Court Judge Thomas Dreschler’s directed verdict came a week into the trial of Jose Urena, 51, and just before closing statements, The Salem News reported. Drechsler said there was insufficient evidence presented at trial. Urena was charged with killing Jeffrie Santana-Peguero, 22, of Lawrence, on New Year’s Eve in 2017. Urena’s estranged wife was dating Santana-Peguero and was pregnant with his child, authorities said. Urena’s attorney, James Budreau, filed the motion for a directed verdict. “While the victim may have been the cause of his marital problems, there is no evidence that Mr. Urena ever threatened Mr. Peguero or otherwise demonstrated a desire to injure him,” Budreau said. The Essex district attorney’s office issued a single sentence on the verdict. “Unfortunately, in these circumstances, the Commonwealth does not have any right of appeal,” the prosecutor said.
{ "pile_set_name": "OpenWebText2" }
Q: Java secondary not public Class usage produces error "Type is not Visible" even if accessed methods are public in Main class I have a Main.java file: public class Main{ private EntityDrawer entityDrawer; public void setEntityDrawer(EntityDrawer entityDrawer) { this.entityDrawer = entityDrawer; } public EntityDrawer getEntityDrawer() { return entityDrawer; } } class EntityDrawer { private Empleado empleado; public Empleado getEmpleado() { return empleado; } public void setEmpleado(Empleado empleado) { this.empleado = empleado; } } If I try to access from another file, it works if I only try to access the entityManager: Main main = new Main(); main.getEntityDrawer(); // NO PROBLEM! But if I try to access one of the attributes (even if public) from entityManager, it does not work: Main main = new Main(); main.getEntityDrawer().getEmpleado(); // Gives error "The type EntityDrawer is not visible" I cannot understand why is happening, could someone give me some insight into this issue?... A: I assume you are trying to use a package local class EntityDrawer in another package, which you cannot do. Try making the class public A: Make the class public or move the calling class to same package.
{ "pile_set_name": "StackExchange" }
Q: Does there exist a curve with non zero area? Does there exist a curve with a bounded infinitely diffrentiable derivative (i.e. has a minimum |curvature|) of hausdorf demension 2? Or even a diffrentiable curve of hausdorf demension 2? A: If $f: X \to Y$ is Lipschitz with Lipschitz constant $k$, i.e. $d(f(x),f(y)) \le k d(x,y)$, then for any $r$ we have $\mathcal H^r(f(X)) \le k^r \mathcal H^r(X)$, where $\mathcal H^r$ is $r$-dimensional Hausdorff measure. Since any continuously differentiable function on an interval is locally Lipschitz, it follows that the image of a $C^1$ curve has $\sigma$-finite $1$-dimensional Hausdorff measure, and in particular Hausdorff dimension $1$. This can be generalized slightly: the image of any differentiable curve has $\sigma$-finite $1$-dimensional Hausdorff measure. See this MO posting.
{ "pile_set_name": "StackExchange" }
Formation of imine oligomers on Au under ambient conditions investigated by scanning tunneling microscopy. Scanning tunneling microscopy has been used to investigate the nucleophilic substitution reaction between melamine (1,3,5-triazine-2,4,6-triamine) and terephthalaldehyde on Au/mica following deposition from solution in ambient conditions. The reaction is observed to proceed at room temperature over a time scale of days with the formation of imine oligomers intermixed with melamine islands on the Au surface. The oligomers ultimately self-assemble into a porous arrangement. The mechanism and extent of the surface confined reactions are discussed.
{ "pile_set_name": "PubMed Abstracts" }
Bólidos de acero Bólidos de acero (English language:) is a 1950 Argentine romantic drama film musical directed and written by Carlos Torres Ríos with music by Ástor Piazzolla. The film is based on tango dancing, an integral part of Argentine culture. Cast Mario Baroffio Antonio Capuano Rodolfo Crespi Nelly Darén Alberto del Solar Roberto Durán Jorge L. Fossati Luis Laneri Francisco Lizzio Ricardo Lorenzo Domingo Márquez Tito Martínez Mario Medrano Ermete Meliante Francisco Monet Ricardo Passano hijo Roberto Real María Luisa Santés Semillita Oscar Villa Jorge Villoldo Diana Wells External links Category:Argentine musical drama films Category:1950 films Category:Spanish-language films Category:1950s romantic drama films Category:Tango films Category:Argentine black-and-white films Category:1950s romantic musical films Category:Romantic musical films Category:Argentine films Category:Films directed by Carlos Torres Ríos
{ "pile_set_name": "Wikipedia (en)" }
require 'puppet' require 'tempfile' describe Puppet::Type.type(:file_line) do let :file_line do Puppet::Type.type(:file_line).new(:name => 'foo', :line => 'line', :path => '/tmp/path') end it 'should accept a line and path' do file_line[:line] = 'my_line' file_line[:line].should == 'my_line' file_line[:path] = '/my/path' file_line[:path].should == '/my/path' end it 'should accept a match regex' do file_line[:match] = '^foo.*$' file_line[:match].should == '^foo.*$' end it 'should not accept a match regex that does not match the specified line' do expect { Puppet::Type.type(:file_line).new( :name => 'foo', :path => '/my/path', :line => 'foo=bar', :match => '^bar=blah$' )}.to raise_error(Puppet::Error, /the value must be a regex that matches/) end it 'should accept a match regex that does match the specified line' do expect { Puppet::Type.type(:file_line).new( :name => 'foo', :path => '/my/path', :line => 'foo=bar', :match => '^\s*foo=.*$' )}.not_to raise_error end it 'should accept posix filenames' do file_line[:path] = '/tmp/path' file_line[:path].should == '/tmp/path' end it 'should not accept unqualified path' do expect { file_line[:path] = 'file' }.should raise_error(Puppet::Error, /File paths must be fully qualified/) end it 'should require that a line is specified' do expect { Puppet::Type.type(:file_line).new(:name => 'foo', :path => '/tmp/file') }.should raise_error(Puppet::Error, /Both line and path are required attributes/) end it 'should require that a file is specified' do expect { Puppet::Type.type(:file_line).new(:name => 'foo', :line => 'path') }.should raise_error(Puppet::Error, /Both line and path are required attributes/) end it 'should default to ensure => present' do file_line[:ensure].should eq :present end it "should autorequire the file it manages" do catalog = Puppet::Resource::Catalog.new file = Puppet::Type.type(:file).new(:name => "/tmp/path") catalog.add_resource file catalog.add_resource file_line relationship = file_line.autorequire.find do |rel| (rel.source.to_s == "File[/tmp/path]") and (rel.target.to_s == file_line.to_s) end relationship.should be_a Puppet::Relationship end it "should not autorequire the file it manages if it is not managed" do catalog = Puppet::Resource::Catalog.new catalog.add_resource file_line file_line.autorequire.should be_empty end end
{ "pile_set_name": "Github" }
Q: Bash Script - Copy latest version of a file in a directory recursively Below, I am trying to find the latest version of a file that could be in multiple directories. Example Directory: ~inventory/emails/2012/06/InventoryFeed-Activev2.csv 2012/06/05 ~inventory/emails/2012/06/InventoryFeed-Activev1.csv 2012/06/03 ~inventory/emails/2012/06/InventoryFeed-Activev.csv 2012/06/01 Heres the bash script: #!/bin/bash FILE = $(find ~/inventory/emails/ -name INVENTORYFEED-Active\*.csv | sort -n | tail -1) #echo $FILE #For Testing cp $FILE ~/inventory/Feed-active.csv; The error I am getting is: ./inventory.sh: line 5: FILE: command not found The script should copy the newest file as attempted above. Two questions: First, is this the best method to achive what I want? Secondly, Whats wrong above? A: It looks good, but you have spaces around the = sign. This won't work. Try: #!/bin/bash FILE=$(find ~/inventory/emails/ -name INVENTORYFEED-Active\*.csv | sort -n | tail -1) #echo $FILE #For Testing cp $FILE ~/inventory/Feed-active.csv;
{ "pile_set_name": "StackExchange" }
[Multifactor analysis of the immunomodulating properties of aclarubicin]. The effect of different doses of aclarubicin, an anthracycline antitumor antibiotic and different regimens of its use on the cellular and humoral immune response in mice with semisyngeneic carcinoma 755 was studied with using multifactor experiments. The resulting quantitative data were computer processed and 2nd order polynomial equations reflecting regressive relationships between the indices being studied and expressed graphically were developed. The analysis indicated that it was possible to use multifactor experiments for studying relationships between various factors defining this or that effect and in particular for determining optimal interaction between therapeutic and immunological activity of antitumor drugs.
{ "pile_set_name": "PubMed Abstracts" }
Set up a regular donation Setting up a monthly donation is a simple way to help Beacon be there for more people. By giving a regular gift, you’ll be helping us sustain our services and plan for the future with confidence. We reach over 2000 adults, young people and children every year but we know that more support is needed and we’re passionate about helping so many more. Your monthly contributions will help ensure that Beacon can continue to offer and build on its services each year.
{ "pile_set_name": "Pile-CC" }
The Bold Type capped off a stellar season with an even more stellar season finale full of tears, laughter and a few dangling cliffhangers that are sure to drive us nuts. How will Sutton (Meghan Fahy) and Richard make their turbulent (and totally aga… Read more
{ "pile_set_name": "Pile-CC" }
Q: AR9285 Wireless (Yet another) on Acer Aspire One 532h-2676 There are literally hundreds of questions with people asking about this wireless device on askubuntu.org. I've spent about 12 hours trying to get it working, to no avail. It's time to solicit some expert help. Information: Acer Aspire One 532h-2676 AR9285 Wireless Ubuntu 12.04 / Updated via ethernet connection (Ditched Windows - so this needs to work!) Problem: The wireless device connects to the router and receives an internal IP, however, no amount of finagling seems to be able to provide me with anything save momentary internet access. I can ping -c 10 192.168.0.XX my address, but I can't ping the router (192.168.0.1) or the internet (google.ca/com). What I've tried and read elsewhere on askubuntu/linuxforums/ubuntuforums Installed sudo apt-get install linux-backports-net-${uname -r) (Expected compatibility drivers) Edited ../ath9k.conf with options ath9k nohcrypt=1 (Read post about hardware encryption problem) Tried using wicd instead (Read post that this worked for some pre 12.04) Fully removed and reinstalled NM sudo apt-get purge network-manager* ... sudo apt-get install network-manager*(Read post that this worked for some) Details People Usually Ask for on Other Questions $ sudo lshw -C network *-network description: Ethernet interface product: AR8132 Fast Ethernet vendor: Atheros Communications Inc. physical id: 0 bus info: pci@0000:01:00.0 logical name: eth1 version: c0 serial: 70:5a:b6:d8:99:53 capacity: 100Mbit/s width: 64 bits clock: 33MHz capabilities: pm msi pciexpress vpd bus_master cap_list ethernet physical tp 10bt 10bt-fd 100bt 100bt-fd autonegotiation configuration: autonegotiation=on broadcast=yes driver=atl1c driverversion=1.0.1.0-NAPI firmware=N/A latency=0 link=no multicast=yes port=twisted pair resources: irq:45 memory:57000000-5703ffff ioport:5000(size=128) *-network description: Wireless interface product: AR9285 Wireless Network Adapter (PCI-Express) vendor: Atheros Communications Inc. physical id: 0 bus info: pci@0000:02:00.0 logical name: wlan0 version: 01 serial: 78:e4:00:24:a0:19 width: 64 bits clock: 33MHz capabilities: pm msi pciexpress bus_master cap_list ethernet physical wireless configuration: broadcast=yes driver=ath9k driverversion=3.2.0-26-generic-pae firmware=N/A ip=192.168.0.19 latency=0 link=yes multicast=yes wireless=IEEE 802.11bgn resources: irq:17 memory:56000000-5600ffff $ rfkill list all 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no 1: acer-wireless: Wireless LAN Soft blocked: no Hard blocked: no $ lspci 00:00.0 Host bridge: Intel Corporation N10 Family DMI Bridge 00:02.0 VGA compatible controller: Intel Corporation N10 Family Integrated Graphics Controller 00:02.1 Display controller: Intel Corporation N10 Family Integrated Graphics Controller 00:1b.0 Audio device: Intel Corporation N10/ICH 7 Family High Definition Audio Controller (rev 02) 00:1c.0 PCI bridge: Intel Corporation N10/ICH 7 Family PCI Express Port 1 (rev 02) 00:1c.1 PCI bridge: Intel Corporation N10/ICH 7 Family PCI Express Port 2 (rev 02) 00:1d.0 USB controller: Intel Corporation N10/ICH 7 Family USB UHCI Controller #1 (rev 02) 00:1d.1 USB controller: Intel Corporation N10/ICH 7 Family USB UHCI Controller #2 (rev 02) 00:1d.2 USB controller: Intel Corporation N10/ICH 7 Family USB UHCI Controller #3 (rev 02) 00:1d.3 USB controller: Intel Corporation N10/ICH 7 Family USB UHCI Controller #4 (rev 02) 00:1d.7 USB controller: Intel Corporation N10/ICH 7 Family USB2 EHCI Controller (rev 02) 00:1e.0 PCI bridge: Intel Corporation 82801 Mobile PCI Bridge (rev e2) 00:1f.0 ISA bridge: Intel Corporation NM10 Family LPC Controller (rev 02) 00:1f.2 SATA controller: Intel Corporation N10/ICH7 Family SATA Controller [AHCI mode] (rev 02) 00:1f.3 SMBus: Intel Corporation N10/ICH 7 Family SMBus Controller (rev 02) 01:00.0 Ethernet controller: Atheros Communications Inc. AR8132 Fast Ethernet (rev c0) 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01) dmesg at startup http://pastebin.com/GKRMmc93 (It's set to be removed in a month, if you see something in there that identifies the problem please denote it and I'll update the question with the line(s) in question so some other unlucky person can dmesg | grep ... for it. A: I have the same problem here and traced it to a conflict in two hardware rfkill switches. In syslog I noted the following details: NetworkManager[668]: <info> found WiFi radio killswitch rfkill0 (at /sys/devices/pci0000:00/0000:00:1c.1/0000:02:00.0/ieee80211/phy0/rfkill0) (driver (unknown)) NetworkManager[668]: <info> found WiFi radio killswitch rfkill1 (at /sys/devices/platform/acer-wmi/rfkill/rfkill1) (driver acer-wmi) I seem to have solved it by blacklisting acer-wmi in this manner: echo blacklist acer-wmi | sudo tee /etc/modprobe.d/blacklist-acer-wmi You can then reboot or enter sudo rmmod acer-wmi.
{ "pile_set_name": "StackExchange" }
1. Field of the Invention The present invention relates to a semiconductor storage device comprising a memory cell, a bit line connected to the memory cell, a precharge circuit which steps up a voltage of the bit line up to a power supply voltage, and a step-down circuit which steps down the voltage of the bit line to a voltage level lower than the power supply voltage before data is read from the memory cell. 2. Description of the Related Art In the field of a semiconductor storage device, there is a conventional technology for improving a data reading speed by stepping down a bitline precharged with a power supply voltage to a voltage level lower than the power supply voltage before data is read so that the power supply voltage level in the bit line can change to a ground level sooner. The change from the power supply voltage level to the ground level in the bit line is detected by a PMO transistor at a subsequent gate. However, when a step-down level in the bit line is below an operation region of a transistor for detection, through current and a data-read error may occur. A similar data-read error also occur in the case where a sense amplifier or a PMOS cross driver is connected to the bit line. Therefore, it is necessary to keep a step-down level of the bit line around a threshold voltage of the PMOS transistor. In a SRAM circuit where the bit line is precharged with the power supply voltage, charges of the power supply voltage level of the bit line flow into a node at which “L” data of SRAM is retained as soon as a word line is activated, in a non-selected column in which reading or writing is being performed. The inflow of too many charges at the time results in the generation of a data-write error. An indicator called a static noise margin shows a level of resistance against the data-write error. The static noise margin has been reduced in recent years as the semiconductor is increasingly miniaturized, and the data-write error is more likely to occur. In order to respond to the recent trend, there is a technology wherein a potential of the power supply voltage level of the bit line is stepped down so as to reduce the current flow into the node of the memory cell at which “L” data is stored when the word line is activated. When the voltage step-down level in the bit line at that time is not enough, the data-write error occurs due to the reason described above. When the voltage step-down level in the bit line is excessive, an data-write error is caused by charges of “L” level of the bit line which flow into the node at which “H” data of the SRAM is retained. Therefore, it is necessary to step down the voltage of the bit line to such a voltage level that can assure the static noise margin. Below is described a technology for stepping down the voltage of the bit line in a conventional semiconductor storage device referring to FIGS. 7A and 7B. FIG. 7A is a circuit diagram illustrating a constitution of a conventional semiconductor storage device, and FIG. 7B is a timing chart illustrating an operation of the semiconductor storage device. In FIG. 7A, 11 denotes a SRAM memory cell, 12 denotes a precharge circuit, 13 denotes an equalizing circuit, 14 denotes a reading circuit, 15 denotes a step-down circuit, BL and /BL are complementary bit lines, WL denotes a word line, PC denotes a precharge control signal, DEC denotes a step-down/equalizing control signal, QP31, QP32 and QP 33 denote PMOS transistors constituting the precharge circuit 12, QP34 denotes a PMOS transistor constituting the equalizing circuit 13, QN31 and QN32 denote NMOS transistors constituting the step-down circuit 15, and Inv0 denotes an inverter. The step-down circuit 15 comprising the step-down transistors QN31 and QN32 is additionally provided in order to step-down voltages of the bit lines BL and /BL prior to the activation of the word line WL. Sources of the step-down transistors QN 31 and QN32 are connected to the ground, drains thereof are directly connected to the bit lines BL and /BL, and gates thereof are connected to a gate of the equalizing transistor QP34 via the inverter Inv0. The gates of the step-down transistors QN 31 and QN32 are driven by the step-down/equalizing control signal DEC. As shown in FIG. 7B, prior to the activation of the word line WL, the precharge control signal PC is negated and turns to “H” level at a timing t31, the precharge transistors QP31 and QP32 and the equalizing transistor QP33 are turned off, which leaves the bit lines BL and /BL in a floating state. At a timing t32, the step-down/equalizing control signal DEC is asserted and turns to “H” level, and the step-down transistors QN31 and QN32 in the step-down circuit 15 are turned on. Further, the equalizing transistor QP34 in the equalizing circuit 13 is turned on, charges of the bit line BL and /BL are then discharged, and potentials of the bit lines BL and /BL are stepped down to a predetermined voltage level. A possible example of the predetermined voltage level is VDD−Vth. VDD is a power supply voltage used for the precharge, and Vth is a threshold voltage of the MOS transistors. When the step-down/equalizing control signal DEC is negated and turns to “L” level at a timing t33, the step-down transistors QN31 and QN 32 are turned off, and the equalizing transistor QP34 is turned off. As a result, the step-down and equalizing operations for the bit lines BL and /BL are halted. At a timing t34, the word line WL is asserted, and data is read from the memory cell 11. In the case where “0” is stored in the memory cell 11, current flows from the bit line BL into the memory cell 11, and the potential of the bit line BL is lowered; however, the potential of the complementary bit line /BL is not stepped down. The state in which the bit line BL=“L” level and the complementary bit line /BL=“H” level is judged by the reading circuit 14 as “0” data. In the case where “1” is stored in the memory cell 11, the current flows from the complementary bit line /BL into the memory cell 11, and the potential of the complementary bit line /BL is lowered, however, the potential of the bit line BL is not stepped down. The bit line BL=“H” level and the complementary bit line /BL=“L” level is judged by the reading circuit 14 as “1” data. Broken lines denoting the potentials of the bit lines BL and /BL illustrate the potential reduction irrespective of whether the reduction occurs in the bit line BL or the complementary bit line /BL. At a timing t35, the word line WL is at “L” level, and the data reading operation is terminated. At a timing t36, the precharge control signal PC is asserted and turns to “L” level, and the precharge transistors QP31 and QP32 and the equalizing transistor QP33 are turned on. Then, the bit lines BL and /BL are precharged with the power supply voltage. In the foregoing description, the step-down levels of the bit lines BL and /BL are adjusted in accordance with a pulse width of the step-down/equalizing control signal DEC. Provided that the step-down level is ΔV, and the pulse width of the step-down/equalizing control signal DEC is Tw, ΔV∝Tw, which means that the step-down level ΔV is substantially in proportion with the pulse width Tw of the step-down/equalizing control signal DEC. In the conventional technology, since the step-down transistors QN31 and QN32 of the step-down circuit 15 are directly connected to the bit lines BL and /BL, load capacities of the bit lines BL and /BL are increased, which results in the deterioration of a reading time in a data cycle of reading data from the memory cell. Further, a timing of the termination of the step-down control is likely to vary when the load capacities of the bit lines BL and /BL are increased. As a result, the step-down levels of the bit lines BL and /BL also vary, which may result in a data-read error.
{ "pile_set_name": "USPTO Backgrounds" }
import { createElement as h } from 'react' import { AppRegistry } from 'react-native' import { BrowserRouter } from 'react-router-dom' import { APP_ID, DATA_KEY } from '@roguejs/app/constants' import App from './App' AppRegistry.registerComponent('App', () => { return props => h(BrowserRouter, {}, h(App, props)) }) AppRegistry.runApplication('App', { initialProps: typeof window !== undefined ? window[DATA_KEY] : {}, rootTag: document.getElementById(APP_ID), }) // https://github.com/alidcastano/rogue.js/issues/78 // import hydrate from'@roguejs/app/client.native' // import App from './App' // hydrate(App) if (module.hot) { module.hot.accept() }
{ "pile_set_name": "Github" }
(Slip Opinion) OCTOBER TERM, 2011 1 Syllabus NOTE: Where it is feasible, a syllabus (headnote) will be released, as is being done in connection with this case, at the time the opinion is issued. The syllabus constitutes no part of the opinion of the Court but has been prepared by the Reporter of Decisions for the convenience of the reader. See United States v. Detroit Timber & Lumber Co., 200 U. S. 321, 337. SUPREME COURT OF THE UNITED STATES Syllabus MILLER v. ALABAMA CERTIORARI TO THE COURT OF CRIMINAL APPEALS OF ALABAMA No. 10–9646. Argued March 20, 2012—Decided June 25, 2012* In each of these cases, a 14-year-old was convicted of murder and sen- tenced to a mandatory term of life imprisonment without the possibil- ity of parole. In No. 10−9647, petitioner Jackson accompanied two other boys to a video store to commit a robbery; on the way to the store, he learned that one of the boys was carrying a shotgun. Jack- son stayed outside the store for most of the robbery, but after he en- tered, one of his co-conspirators shot and killed the store clerk. Ar- kansas charged Jackson as an adult with capital felony murder and aggravated robbery, and a jury convicted him of both crimes. The trial court imposed a statutorily mandated sentence of life imprison- ment without the possibility of parole. Jackson filed a state habeas petition, arguing that a mandatory life-without-parole term for a 14- year-old violates the Eighth Amendment. Disagreeing, the court granted the State’s motion to dismiss. The Arkansas Supreme Court affirmed. In No. 10−9646, petitioner Miller, along with a friend, beat Miller’s neighbor and set fire to his trailer after an evening of drinking and drug use. The neighbor died. Miller was initially charged as a juve- nile, but his case was removed to adult court, where he was charged with murder in the course of arson. A jury found Miller guilty, and the trial court imposed a statutorily mandated punishment of life without parole. The Alabama Court of Criminal Appeals affirmed, holding that Miller’s sentence was not overly harsh when compared to his crime, and that its mandatory nature was permissible under —————— * Together with No. 10–9647, Jackson v. Hobbs, Director, Arkansas Department of Correction, on certiorari to the Supreme Court of Arkan- sas. 2 MILLER v. ALABAMA Syllabus the Eighth Amendment. Held: The Eighth Amendment forbids a sentencing scheme that man- dates life in prison without possibility of parole for juvenile homicide offenders. Pp. 6−27. (a) The Eighth Amendment’s prohibition of cruel and unusual pun- ishment “guarantees individuals the right not to be subjected to ex- cessive sanctions.” Roper v. Simmons, 543 U. S. 551, 560. That right “flows from the basic ‘precept of justice that punishment for crime should be graduated and proportioned’ ” to both the offender and the offense. Ibid. Two strands of precedent reflecting the concern with proportionate punishment come together here. The first has adopted categorical bans on sentencing practices based on mismatches between the cul- pability of a class of offenders and the severity of a penalty. See, e.g., Kennedy v. Louisiana, 554 U. S. 407. Several cases in this group have specially focused on juvenile offenders, because of their lesser culpability. Thus, Roper v. Simmons held that the Eighth Amend- ment bars capital punishment for children, and Graham v. Florida, 560 U. S. ___, concluded that the Amendment prohibits a sentence of life without the possibility of parole for a juvenile convicted of a non- homicide offense. Graham further likened life without parole for ju- veniles to the death penalty, thereby evoking a second line of cases. In those decisions, this Court has required sentencing authorities to consider the characteristics of a defendant and the details of his of- fense before sentencing him to death. See, e.g., Woodson v. North Carolina, 428 U. S. 280 (plurality opinion). Here, the confluence of these two lines of precedent leads to the conclusion that mandatory life without parole for juveniles violates the Eighth Amendment. As to the first set of cases: Roper and Graham establish that chil- dren are constitutionally different from adults for sentencing purpos- es. Their “ ‘lack of maturity’ ” and “ ‘underdeveloped sense of respon- sibility’ ” lead to recklessness, impulsivity, and heedless risk-taking. Roper, 543 U. S., at 569. They “are more vulnerable . . . to negative influences and outside pressures,” including from their family and peers; they have limited “contro[l] over their own environment” and lack the ability to extricate themselves from horrific, crime-producing settings. Ibid. And because a child’s character is not as “well formed” as an adult’s, his traits are “less fixed” and his actions are less likely to be “evidence of irretrievabl[e] deprav[ity].” Id., at 570. Roper and Graham emphasized that the distinctive attributes of youth diminish the penological justifications for imposing the harsh- est sentences on juvenile offenders, even when they commit terrible crimes. While Graham’s flat ban on life without parole was for nonhomi- Cite as: 567 U. S. ____ (2012) 3 Syllabus cide crimes, nothing that Graham said about children is crime- specific. Thus, its reasoning implicates any life-without-parole sen- tence for a juvenile, even as its categorical bar relates only to non- homicide offenses. Most fundamentally, Graham insists that youth matters in determining the appropriateness of a lifetime of incarcera- tion without the possibility of parole. The mandatory penalty schemes at issue here, however, prevent the sentencer from consider- ing youth and from assessing whether the law’s harshest term of im- prisonment proportionately punishes a juvenile offender. This con- travenes Graham’s (and also Roper’s) foundational principle: that imposition of a State’s most severe penalties on juvenile offenders cannot proceed as though they were not children. Graham also likened life-without-parole sentences for juveniles to the death penalty. That decision recognized that life-without-parole sentences “share some characteristics with death sentences that are shared by no other sentences.” 560 U. S., at ___. And it treated life without parole for juveniles like this Court’s cases treat the death penalty, imposing a categorical bar on its imposition for nonhomicide offenses. By likening life-without-parole sentences for juveniles to the death penalty, Graham makes relevant this Court’s cases de- manding individualized sentencing in capital cases. In particular, those cases have emphasized that sentencers must be able to consid- er the mitigating qualities of youth. In light of Graham’s reasoning, these decisions also show the flaws of imposing mandatory life- without-parole sentences on juvenile homicide offenders. Pp. 6−17. (b) The counterarguments of Alabama and Arkansas are unpersua- sive. Pp. 18–27. (1) The States first contend that Harmelin v. Michigan, 501 U. S. 957, forecloses a holding that mandatory life-without-parole sentences for juveniles violate the Eighth Amendment. Harmelin de- clined to extend the individualized sentencing requirement to non- capital cases “because of the qualitative difference between death and all other penalties.” Id., at 1006 (KENNEDY, J., concurring in part and concurring in judgment). But Harmelin had nothing to do with chil- dren, and did not purport to apply to juvenile offenders. Indeed, since Harmelin, this Court has held on multiple occasions that sen- tencing practices that are permissible for adults may not be so for children. See Roper, 543 U. S. 551; Graham, 560 U. S ___. The States next contend that mandatory life-without-parole terms for juveniles cannot be unconstitutional because 29 jurisdictions im- pose them on at least some children convicted of murder. In consid- ering categorical bars to the death penalty and life without parole, this Court asks as part of the analysis whether legislative enact- ments and actual sentencing practices show a national consensus 4 MILLER v. ALABAMA Syllabus against a sentence for a particular class of offenders. But where, as here, this Court does not categorically bar a penalty, but instead re- quires only that a sentencer follow a certain process, this Court has not scrutinized or relied on legislative enactments in the same way. See, e.g., Sumner v. Schuman, 483 U. S. 66. In any event, the “objective indicia of society’s standards,” Graham, 560 U. S., at ___, that the States offer do not distinguish these cases from others holding that a sentencing practice violates the Eighth Amendment. Fewer States impose mandatory life-without-parole sentences on juvenile homicide offenders than authorized the penalty (life-without-parole for nonhomicide offenders) that this Court invali- dated in Graham. And as Graham and Thompson v. Oklahoma, 487 U. S. 815, explain, simply counting legislative enactments can pre- sent a distorted view. In those cases, as here, the relevant penalty applied to juveniles based on two separate provisions: One allowed the transfer of certain juvenile offenders to adult court, while another set out penalties for any and all individuals tried there. In those cir- cumstances, this Court reasoned, it was impossible to say whether a legislature had endorsed a given penalty for children (or would do so if presented with the choice). The same is true here. Pp. 18–25. (2) The States next argue that courts and prosecutors suffi- ciently consider a juvenile defendant’s age, as well as his background and the circumstances of his crime, when deciding whether to try him as an adult. But this argument ignores that many States use manda- tory transfer systems. In addition, some lodge the decision in the hands of the prosecutors, rather than courts. And even where judges have transfer-stage discretion, it has limited utility, because the deci- sionmaker typically will have only partial information about the child or the circumstances of his offense. Finally, because of the limited sentencing options in some juvenile courts, the transfer decision may present a choice between a light sentence as a juvenile and standard sentencing as an adult. It cannot substitute for discretion at post- trial sentencing. Pp. 25−27. No. 10−9646, 63 So. 3d 676, and No. 10−9647, 2011 Ark. 49, ___ S. W. 3d ___, reversed and remanded. KAGAN, J., delivered the opinion of the Court, in which KENNEDY, GINSBURG, BREYER, and SOTOMAYOR, JJ., joined. BREYER, J., filed a con- curring opinion, in which SOTOMAYOR, J., joined. ROBERTS, C. J., filed a dissenting opinion, in which SCALIA, THOMAS, and ALITO, JJ., joined. THOMAS, J., filed a dissenting opinion, in which SCALIA, J., joined. ALITO, J., filed a dissenting opinion, in which SCALIA, J., joined. Cite as: 567 U. S. ____ (2012) 1 Opinion of the Court NOTICE: This opinion is subject to formal revision before publication in the preliminary print of the United States Reports. Readers are requested to notify the Reporter of Decisions, Supreme Court of the United States, Wash- ington, D. C. 20543, of any typographical or other formal errors, in order that corrections may be made before the preliminary print goes to press. SUPREME COURT OF THE UNITED STATES _________________ Nos. 10–9646 and 10–9647 _________________ EVAN MILLER, PETITIONER 10–9646 v. ALABAMA ON WRIT OF CERTIORARI TO THE COURT OF CRIMINAL APPEALS OF ALABAMA KUNTRELL JACKSON, PETITIONER 10–9647 v. RAY HOBBS, DIRECTOR, ARKANSAS DEPARTMENT OF CORRECTION ON WRIT OF CERTIORARI TO THE SUPREME COURT OF ARKANSAS [June 25, 2012] JUSTICE KAGAN delivered the opinion of the Court. The two 14-year-old offenders in these cases were convict- ed of murder and sentenced to life imprisonment without the possibility of parole. In neither case did the sentenc- ing authority have any discretion to impose a different punishment. State law mandated that each juvenile die in prison even if a judge or jury would have thought that his youth and its attendant characteristics, along with the nature of his crime, made a lesser sentence (for example, life with the possibility of parole) more appropriate. Such a scheme prevents those meting out punishment from considering a juvenile’s “lessened culpability” and greater “capacity for change,” Graham v. Florida, 560 U. S. ___, 2 MILLER v. ALABAMA Opinion of the Court ___ (2010) (slip op., at 17, 23), and runs afoul of our cases’ requirement of individualized sentencing for defendants facing the most serious penalties. We therefore hold that mandatory life without parole for those under the age of 18 at the time of their crimes violates the Eighth Amend- ment’s prohibition on “cruel and unusual punishments.” I A In November 1999, petitioner Kuntrell Jackson, then 14 years old, and two other boys decided to rob a video store. En route to the store, Jackson learned that one of the boys, Derrick Shields, was carrying a sawed-off shotgun in his coat sleeve. Jackson decided to stay outside when the two other boys entered the store. Inside, Shields pointed the gun at the store clerk, Laurie Troup, and demanded that she “give up the money.” Jackson v. State, 359 Ark. 87, 89, 194 S. W. 3d 757, 759 (2004) (internal quotation marks omitted). Troup refused. A few moments later, Jackson went into the store to find Shields continuing to demand money. At trial, the parties disputed whether Jackson warned Troup that “[w]e ain’t playin’,” or instead told his friends, “I thought you all was playin’.” Id., at 91, 194 S. W. 3d, at 760 (internal quotation marks omitted). When Troup threatened to call the police, Shields shot and killed her. The three boys fled empty-handed. See id., at 89–92, 194 S. W. 3d, at 758–760. Arkansas law gives prosecutors discretion to charge 14- year-olds as adults when they are alleged to have commit- ted certain serious offenses. See Ark. Code Ann. §9–27– 318(c)(2) (1998). The prosecutor here exercised that au- thority by charging Jackson with capital felony murder and aggravated robbery. Jackson moved to transfer the case to juvenile court, but after considering the alleged facts of the crime, a psychiatrist’s examination, and Jack- son’s juvenile arrest history (shoplifting and several inci- Cite as: 567 U. S. ____ (2012) 3 Opinion of the Court dents of car theft), the trial court denied the motion, and an appellate court affirmed. See Jackson v. State, No. 02–535, 2003 WL 193412, *1 (Ark. App., Jan. 29, 2003); §§9–27–318(d), (e). A jury later convicted Jackson of both crimes. Noting that “in view of [the] verdict, there’s only one possible punishment,” the judge sentenced Jackson to life without parole. App. in No. 10–9647, p. 55 (hereinaf- ter Jackson App.); see Ark. Code Ann. §5–4–104(b) (1997) (“A defendant convicted of capital murder or treason shall be sentenced to death or life imprisonment without pa- role”).1 Jackson did not challenge the sentence on appeal, and the Arkansas Supreme Court affirmed the convic- tions. See 359 Ark. 87, 194 S. W. 3d 757. Following Roper v. Simmons, 543 U. S. 551 (2005), in which this Court invalidated the death penalty for all juvenile offenders under the age of 18, Jackson filed a state petition for habeas corpus. He argued, based on Roper’s reasoning, that a mandatory sentence of life with- out parole for a 14-year-old also violates the Eighth Amendment. The circuit court rejected that argument and granted the State’s motion to dismiss. See Jackson App. 72–76. While that ruling was on appeal, this Court held in Graham v. Florida that life without parole violates the Eighth Amendment when imposed on juvenile nonhomi- cide offenders. After the parties filed briefs addressing that decision, the Arkansas Supreme Court affirmed the dismissal of Jackson’s petition. See Jackson v. Norris, 2011 Ark. 49, ___ S. W. 3d ___. The majority found that Roper and Graham were “narrowly tailored” to their con- texts: “death-penalty cases involving a juvenile and life- imprisonment-without-parole cases for nonhomicide of- —————— 1 Jackson was ineligible for the death penalty under Thompson v. Oklahoma, 487 U. S. 815 (1988) (plurality opinion), which held that capital punishment of offenders under the age of 16 violates the Eighth Amendment. 4 MILLER v. ALABAMA Opinion of the Court fenses involving a juvenile.” Id., at 5, ___ S. W. 3d, at ___. Two justices dissented. They noted that Jackson was not the shooter and that “any evidence of intent to kill was severely lacking.” Id., at 10, ___ S. W. 3d, at ___ (Danielson, J., dissenting). And they argued that Jack- son’s mandatory sentence ran afoul of Graham’s admoni- tion that “ ‘[a]n offender’s age is relevant to the Eighth Amendment, and criminal procedure laws that fail to take defendants’ youthfulness into account at all would be flawed.’ ” Id., at 10–11, ___ S. W. 3d, at ___ (quoting Gra- ham, 560 U. S., at ___ (slip op., at 25)).2 B Like Jackson, petitioner Evan Miller was 14 years old at the time of his crime. Miller had by then been in and out of foster care because his mother suffered from alcoholism and drug addiction and his stepfather abused him. Miller, too, regularly used drugs and alcohol; and he had at- tempted suicide four times, the first when he was six years old. See E. J. M. v. State, 928 So. 2d 1077, 1081 (Ala. Crim. App. 2004) (Cobb, J., concurring in result); App. in No. 10–9646, pp. 26–28 (hereinafter Miller App.). One night in 2003, Miller was at home with a friend, Colby Smith, when a neighbor, Cole Cannon, came to make a drug deal with Miller’s mother. See 6 Record in No. 10–9646, p. 1004. The two boys followed Cannon back to his trailer, where all three smoked marijuana and —————— 2 For the first time in this Court, Arkansas contends that Jackson’s sentence was not mandatory. On its view, state law then in effect allowed the trial judge to suspend the life-without-parole sentence and commit Jackson to the Department of Human Services for a “training- school program,” at the end of which he could be placed on probation. Brief for Respondent in No. 10–9647, pp. 36–37 (hereinafter Arkansas Brief) (citing Ark. Code Ann. §12–28–403(b)(2) (1999)). But Arkansas never raised that objection in the state courts, and they treated Jack- son’s sentence as mandatory. We abide by that interpretation of state law. See, e.g., Mullaney v. Wilbur, 421 U. S. 684, 690–691 (1975). Cite as: 567 U. S. ____ (2012) 5 Opinion of the Court played drinking games. When Cannon passed out, Miller stole his wallet, splitting about $300 with Smith. Miller then tried to put the wallet back in Cannon’s pocket, but Cannon awoke and grabbed Miller by the throat. Smith hit Cannon with a nearby baseball bat, and once released, Miller grabbed the bat and repeatedly struck Cannon with it. Miller placed a sheet over Cannon’s head, told him “ ‘I am God, I’ve come to take your life,’ ” and delivered one more blow. Miller v. State, 63 So. 3d 676, 689 (Ala. Crim. App. 2010). The boys then retreated to Miller’s trailer, but soon decided to return to Cannon’s to cover up evidence of their crime. Once there, they lit two fires. Cannon even- tually died from his injuries and smoke inhalation. See id., at 683–685, 689. Alabama law required that Miller initially be charged as a juvenile, but allowed the District Attorney to seek re- moval of the case to adult court. See Ala. Code §12–15–34 (1977). The D. A. did so, and the juvenile court agreed to the transfer after a hearing. Citing the nature of the crime, Miller’s “mental maturity,” and his prior juvenile offenses (truancy and “criminal mischief”), the Alabama Court of Criminal Appeals affirmed. E. J. M. v. State, No. CR–03–0915, pp. 5–7 (Aug. 27, 2004) (unpublished memo- randum).3 The State accordingly charged Miller as an adult with murder in the course of arson. That crime (like capital murder in Arkansas) carries a mandatory mini- —————— 3 The Court of Criminal Appeals also affirmed the juvenile court’s denial of Miller’s request for funds to hire his own mental expert for the transfer hearing. The court pointed out that under governing Alabama Supreme Court precedent, “the procedural requirements of a trial do not ordinarily apply” to those hearings. E. J. M. v. State, 928 So. 2d 1077 (2004) (Cobb, J., concurring in result) (internal quotation marks omitted). In a separate opinion, Judge Cobb agreed on the reigning precedent, but urged the State Supreme Court to revisit the question in light of transfer hearings’ importance. See id., at 1081 (“[A]lthough later mental evaluation as an adult affords some semblance of proce- dural due process, it is, in effect, too little, too late”). 6 MILLER v. ALABAMA Opinion of the Court mum punishment of life without parole. See Ala. Code §§13A–5–40(9), 13A–6–2(c) (1982). Relying in significant part on testimony from Smith, who had pleaded to a lesser offense, a jury found Miller guilty. He was therefore sentenced to life without the possibility of parole. The Alabama Court of Criminal Appeals affirmed, ruling that life without parole was “not overly harsh when compared to the crime” and that the mandatory nature of the sentencing scheme was permissi- ble under the Eighth Amendment. 63 So. 3d, at 690; see id., at 686–691. The Alabama Supreme Court denied review. We granted certiorari in both cases, see 565 U. S. ___ (2011) (No. 10–9646); 565 U. S. ___ (2011) (No. 10–9647), and now reverse. II The Eighth Amendment’s prohibition of cruel and un- usual punishment “guarantees individuals the right not to be subjected to excessive sanctions.” Roper, 543 U. S., at 560. That right, we have explained, “flows from the basic ‘precept of justice that punishment for crime should be graduated and proportioned’ ” to both the offender and the offense. Ibid. (quoting Weems v. United States, 217 U. S. 349, 367 (1910)). As we noted the last time we consid- ered life-without-parole sentences imposed on juveniles, “[t]he concept of proportionality is central to the Eighth Amendment.” Graham, 560 U. S., at ___ (slip op., at 8). And we view that concept less through a historical prism than according to “ ‘the evolving standards of decency that mark the progress of a maturing society.’ ” Estelle v. Gamble, 429 U. S. 97, 102 (1976) (quoting Trop v. Dulles, 356 U. S. 86, 101 (1958) (plurality opinion)). The cases before us implicate two strands of precedent reflecting our concern with proportionate punishment. The first has adopted categorical bans on sentencing Cite as: 567 U. S. ____ (2012) 7 Opinion of the Court practices based on mismatches between the culpability of a class of offenders and the severity of a penalty. See Graham, 560 U. S., at ___ (slip op., at 9–10) (listing cases). So, for example, we have held that imposing the death penalty for nonhomicide crimes against individuals, or imposing it on mentally retarded defendants, violates the Eighth Amendment. See Kennedy v. Louisiana, 554 U. S. 407 (2008); Atkins v. Virginia, 536 U. S. 304 (2002). Sev- eral of the cases in this group have specially focused on juvenile offenders, because of their lesser culpability. Thus, Roper held that the Eighth Amendment bars capital punishment for children, and Graham concluded that the Amendment also prohibits a sentence of life without the possibility of parole for a child who committed a nonhomi- cide offense. Graham further likened life without parole for juveniles to the death penalty itself, thereby evoking a second line of our precedents. In those cases, we have prohibited mandatory imposition of capital punishment, requiring that sentencing authorities consider the charac- teristics of a defendant and the details of his offense before sentencing him to death. See Woodson v. North Carolina, 428 U. S. 280 (1976) (plurality opinion); Lockett v. Ohio, 438 U. S. 586 (1978). Here, the confluence of these two lines of precedent leads to the conclusion that mandatory life-without-parole sentences for juveniles violate the Eighth Amendment.4 —————— 4 The three dissenting opinions here each take issue with some or all of those precedents. See post, at 5–6 (opinion of ROBERTS, C. J.); post, at 1–6 (opinion of THOMAS, J.); post, at 1–4 (opinion of ALITO, J.). That is not surprising: their authors (and joiner) each dissented from some or all of those precedents. See, e.g., Kennedy, 554 U. S., at 447 (ALITO, J., joined by ROBERTS, C. J., and SCALIA and THOMAS, JJ., dissenting); Roper, 543 U. S., at 607 (SCALIA, J., joined by THOMAS, J., dissenting); Atkins, 536 U. S., at 337 (SCALIA, J., joined by THOMAS, J., dissent- ing); Thompson, 487 U. S., at 859 ((SCALIA, J., dissenting); Graham v. Collins, 506 U. S. 461, 487 (1993) (THOMAS, J., concurring) (contending that Woodson was wrongly decided). In particular, each disagreed with 8 MILLER v. ALABAMA Opinion of the Court To start with the first set of cases: Roper and Graham establish that children are constitutionally different from adults for purposes of sentencing. Because juveniles have diminished culpability and greater prospects for reform, we explained, “they are less deserving of the most severe punishments.” Graham, 560 U. S., at ___ (slip op., at 17). Those cases relied on three significant gaps between juve- niles and adults. First, children have a “ ‘lack of maturity and an underdeveloped sense of responsibility,’ ” leading to recklessness, impulsivity, and heedless risk-taking. Roper, 543 U. S., at 569. Second, children “are more vulner- able . . . to negative influences and outside pressures,” including from their family and peers; they have limited “contro[l] over their own environment” and lack the ability to extricate themselves from horrific, crime-producing settings. Ibid. And third, a child’s character is not as “well formed” as an adult’s; his traits are “less fixed” and his actions less likely to be “evidence of irretrievabl[e] deprav[ity].” Id., at 570. Our decisions rested not only on common sense—on what “any parent knows”—but on science and social sci- ence as well. Id., at 569. In Roper, we cited studies showing that “‘[o]nly a relatively small proportion of adoles- cents’ ” who engage in illegal activity “ ‘develop entrenched patterns of problem behavior.’ ” Id., at 570 (quoting Stein- berg & Scott, Less Guilty by Reason of Adolescence: De- velopmental Immaturity, Diminished Responsibility, and the Juvenile Death Penalty, 58 Am. Psychologist 1009, —————— the majority’s reasoning in Graham, which is the foundation stone of our analysis. See Graham, 560 U. S., at ___ (ROBERTS, C. J., concurring in judgment) (slip op., at 1); id., at ___ (THOMAS, J., joined by SCALIA and ALITO, JJ., dissenting) (slip op., at 1–25); id., at ___ (ALITO, J., dissenting) (slip op., at 1). While the dissents seek to relitigate old Eighth Amendment battles, repeating many arguments this Court has previously (and often) rejected, we apply the logic of Roper, Graham, and our individualized sentencing decisions to these two cases. Cite as: 567 U. S. ____ (2012) 9 Opinion of the Court 1014 (2003)). And in Graham, we noted that “develop- ments in psychology and brain science continue to show fundamental differences between juvenile and adult minds”—for example, in “parts of the brain involved in behavior control.” 560 U. S., at ___ (slip op., at 17).5 We reasoned that those findings—of transient rashness, pro- clivity for risk, and inability to assess consequences—both lessened a child’s “moral culpability” and enhanced the prospect that, as the years go by and neurological devel- opment occurs, his “ ‘deficiencies will be reformed.’ ” Id., at ___ (slip op., at 18) (quoting Roper, 543 U. S., at 570). Roper and Graham emphasized that the distinctive at- tributes of youth diminish the penological justifications for imposing the harshest sentences on juvenile offenders, even when they commit terrible crimes. Because “ ‘[t]he heart of the retribution rationale’ ” relates to an offender’s blameworthiness, “ ‘the case for retribution is not as strong with a minor as with an adult.’ ” Graham, 560 U. S., at ___ (slip op., at 20–21) (quoting Tison v. Arizona, 481 U. S. 137, 149 (1987); Roper, 543 U. S., at 571). Nor can deter- rence do the work in this context, because “ ‘the same characteristics that render juveniles less culpable than adults’ ”—their immaturity, recklessness, and impetuos- ity—make them less likely to consider potential punish- —————— 5 The evidence presented to us in these cases indicates that the sci- ence and social science supporting Roper’s and Graham’s conclusions have become even stronger. See, e.g., Brief for American Psychologi- cal Association et al. as Amici Curiae 3 (“[A]n ever-growing body of research in developmental psychology and neuroscience continues to confirm and strengthen the Court’s conclusions”); id., at 4 (“It is in- creasingly clear that adolescent brains are not yet fully mature in regions and systems related to higher-order executive functions such as impulse control, planning ahead, and risk avoidance”); Brief for J. Lawrence Aber et al. as Amici Curiae 12–28 (discussing post-Graham studies); id., at 26–27 (“Numerous studies post-Graham indicate that exposure to deviant peers leads to increased deviant behavior and is a consistent predictor of adolescent delinquency” (footnote omitted)). 10 MILLER v. ALABAMA Opinion of the Court ment. Graham, 560 U. S., at ___ (slip op., at 21) (quoting Roper, 543 U. S., at 571). Similarly, incapacitation could not support the life-without-parole sentence in Graham: Deciding that a “juvenile offender forever will be a danger to society” would require “mak[ing] a judgment that [he] is incorrigible”—but “ ‘incorrigibility is inconsistent with youth.’ ” 560 U. S., at ___ (slip op., at 22) (quoting Work- man v. Commonwealth, 429 S. W. 2d 374, 378 (Ky. App. 1968)). And for the same reason, rehabilitation could not justify that sentence. Life without parole “forswears altogether the rehabilitative ideal.” Graham, 560 U. S., at ___ (slip op., at 23). It reflects “an irrevocable judgment about [an offender’s] value and place in society,” at odds with a child’s capacity for change. Ibid. Graham concluded from this analysis that life-without- parole sentences, like capital punishment, may violate the Eighth Amendment when imposed on children. To be sure, Graham’s flat ban on life without parole applied only to nonhomicide crimes, and the Court took care to distin- guish those offenses from murder, based on both moral culpability and consequential harm. See id., at ___ (slip op., at 18). But none of what it said about children—about their distinctive (and transitory) mental traits and en- vironmental vulnerabilities—is crime-specific. Those features are evident in the same way, and to the same de- gree, when (as in both cases here) a botched robbery turns into a killing. So Graham’s reasoning implicates any life- without-parole sentence imposed on a juvenile, even as its categorical bar relates only to nonhomicide offenses. Most fundamentally, Graham insists that youth matters in determining the appropriateness of a lifetime of incar- ceration without the possibility of parole. In the circum- stances there, juvenile status precluded a life-without- parole sentence, even though an adult could receive it for a similar crime. And in other contexts as well, the charac- teristics of youth, and the way they weaken rationales for Cite as: 567 U. S. ____ (2012) 11 Opinion of the Court punishment, can render a life-without-parole sentence disproportionate. Cf. id., at ___ (slip op., at 20–23) (gener- ally doubting the penological justifications for imposing life without parole on juveniles). “An offender’s age,” we made clear in Graham, “is relevant to the Eighth Amend- ment,” and so “criminal procedure laws that fail to take defendants’ youthfulness into account at all would be flawed.” Id., at ___ (slip op., at 25). THE CHIEF JUSTICE, concurring in the judgment, made a similar point. Al- though rejecting a categorical bar on life-without-parole sentences for juveniles, he acknowledged “Roper’s conclu- sion that juveniles are typically less culpable than adults,” and accordingly wrote that “an offender’s juvenile status can play a central role” in considering a sentence’s propor- tionality. Id., at ___ (slip op., at 5–6); see id., at ___ (slip op., at 12) (Graham’s “youth is one factor, among others, that should be considered in deciding whether his pun- ishment was unconstitutionally excessive”).6 But the mandatory penalty schemes at issue here pre- vent the sentencer from taking account of these central considerations. By removing youth from the balance— by subjecting a juvenile to the same life-without-parole sentence applicable to an adult—these laws prohibit a sentencing authority from assessing whether the law’s harshest term of imprisonment proportionately punishes a juvenile offender. That contravenes Graham’s (and also Roper’s) foundational principle: that imposition of a State’s —————— 6 In discussing Graham, the dissents essentially ignore all of this reasoning. See post, at 3–6 (opinion of ROBERTS, C. J.); post, at 4 (opinion of ALITO, J.). Indeed, THE CHIEF JUSTICE ignores the points made in his own concurring opinion. The only part of Graham that the dissents see fit to note is the distinction it drew between homicide and nonhomicide offenses. See post, at 7–8 (opinion of ROBERTS, C. J.); post, at 4 (opinion of ALITO, J.). But contrary to the dissents’ charge, our decision today retains that distinction: Graham established one rule (a flat ban) for nonhomicide offenses, while we set out a different one (individualized sentencing) for homicide offenses. 12 MILLER v. ALABAMA Opinion of the Court most severe penalties on juvenile offenders cannot proceed as though they were not children. And Graham makes plain these mandatory schemes’ defects in another way: by likening life-without-parole sentences imposed on juveniles to the death penalty itself. Life-without-parole terms, the Court wrote, “share some characteristics with death sentences that are shared by no other sentences.” 560 U. S., at ___ (slip op., at 19). Im- prisoning an offender until he dies alters the remainder of his life “by a forfeiture that is irrevocable.” Ibid. (citing Solem v. Helm, 463 U. S. 277, 300–301 (1983)). And this lengthiest possible incarceration is an “especially harsh punishment for a juvenile,” because he will almost inevi- tably serve “more years and a greater percentage of his life in prison than an adult offender.” Graham, 560 U. S., at ___ (slip op., at 19–20). The penalty when imposed on a teenager, as compared with an older person, is therefore “the same . . . in name only.” Id., at ___ (slip op., at 20). All of that suggested a distinctive set of legal rules: In part because we viewed this ultimate penalty for juveniles as akin to the death penalty, we treated it similarly to that most severe punishment. We imposed a categorical ban on the sentence’s use, in a way unprecedented for a term of imprisonment. See id., at ___ (slip op., at 9); id., at ___ (THOMAS, J., dissenting) (slip op., at 7) (“For the first time in its history, the Court declares an entire class of offend- ers immune from a noncapital sentence using the categori- cal approach it previously reserved for death penalty cases alone”). And the bar we adopted mirrored a proscription first established in the death penalty context—that the punishment cannot be imposed for any nonhomicide crimes against individuals. See Kennedy, 554 U. S. 407; Coker v. Georgia, 433 U. S. 584 (1977). That correspondence—Graham’s “[t]reat[ment] [of] juvenile life sentences as analogous to capital punish- ment,” 560 U. S., at ___ (ROBERTS, C. J., concurring in Cite as: 567 U. S. ____ (2012) 13 Opinion of the Court judgment) (slip op., at 5)—makes relevant here a second line of our precedents, demanding individualized sentenc- ing when imposing the death penalty. In Woodson, 428 U. S. 280, we held that a statute mandating a death sen- tence for first-degree murder violated the Eighth Amend- ment. We thought the mandatory scheme flawed because it gave no significance to “the character and record of the individual offender or the circumstances” of the offense, and “exclud[ed] from consideration . . . the possibility of compassionate or mitigating factors.” Id., at 304. Subse- quent decisions have elaborated on the requirement that capital defendants have an opportunity to advance, and the judge or jury a chance to assess, any mitigating fac- tors, so that the death penalty is reserved only for the most culpable defendants committing the most serious offenses. See, e.g., Sumner v. Shuman, 483 U. S. 66, 74– 76 (1987); Eddings v. Oklahoma, 455 U. S. 104, 110–112 (1982); Lockett, 438 U. S., at 597–609 (plurality opinion). Of special pertinence here, we insisted in these rulings that a sentencer have the ability to consider the “mitigat- ing qualities of youth.” Johnson v. Texas, 509 U. S. 350, 367 (1993). Everything we said in Roper and Graham about that stage of life also appears in these decisions. As we observed, “youth is more than a chronological fact.” Eddings, 455 U. S., at 115. It is a time of immaturity, ir- responsibility, “impetuousness[,] and recklessness.” John- son, 509 U. S., at 368. It is a moment and “condition of life when a person may be most susceptible to influence and to psychological damage.” Eddings, 455 U. S., at 115. And its “signature qualities” are all “transient.” Johnson, 509 U. S., at 368. Eddings is especially on point. There, a 16-year-old shot a police officer point-blank and killed him. We invalidated his death sentence because the judge did not consider evidence of his neglectful and violent family background (including his mother’s drug abuse and his father’s physical abuse) and his emotional disturbance. 14 MILLER v. ALABAMA Opinion of the Court We found that evidence “particularly relevant”—more so than it would have been in the case of an adult offender. 455 U. S., at 115. We held: “[J]ust as the chronological age of a minor is itself a relevant mitigating factor of great weight, so must the background and mental and emotional development of a youthful defendant be duly considered” in assessing his culpability. Id., at 116. In light of Graham’s reasoning, these decisions too show the flaws of imposing mandatory life-without-parole sen- tences on juvenile homicide offenders. Such mandatory penalties, by their nature, preclude a sentencer from taking account of an offender’s age and the wealth of characteristics and circumstances attendant to it. Under these schemes, every juvenile will receive the same sen- tence as every other—the 17-year-old and the 14-year-old, the shooter and the accomplice, the child from a stable household and the child from a chaotic and abusive one. And still worse, each juvenile (including these two 14- year-olds) will receive the same sentence as the vast ma- jority of adults committing similar homicide offenses—but really, as Graham noted, a greater sentence than those adults will serve.7 In meting out the death penalty, the elision of all these differences would be strictly forbidden. And once again, Graham indicates that a similar rule should apply when a juvenile confronts a sentence of life (and death) in prison. So Graham and Roper and our individualized sentenc- —————— 7 Although adults are subject as well to the death penalty in many jurisdictions, very few offenders actually receive that sentence. See, e.g., Dept. of Justice, Bureau of Justice Statistics, S. Rosenmerkel, M. Durose, & D. Farole, Felony Sentences in State Courts 2006— Statistical Tables, p. 28 (Table 4.4) (rev. Nov. 22, 2010). So in practice, the sentencing schemes at issue here result in juvenile homicide offenders receiving the same nominal punishment as almost all adults, even though the two classes differ significantly in moral culpability and capacity for change. Cite as: 567 U. S. ____ (2012) 15 Opinion of the Court ing cases alike teach that in imposing a State’s harshest penalties, a sentencer misses too much if he treats every child as an adult. To recap: Mandatory life without parole for a juvenile precludes consideration of his chronological age and its hallmark features—among them, immaturity, impetuosity, and failure to appreciate risks and conse- quences. It prevents taking into account the family and home environment that surrounds him—and from which he cannot usually extricate himself—no matter how bru- tal or dysfunctional. It neglects the circumstances of the homicide offense, including the extent of his participation in the conduct and the way familial and peer pressures may have affected him. Indeed, it ignores that he might have been charged and convicted of a lesser offense if not for incompetencies associated with youth—for example, his inability to deal with police officers or prosecutors (including on a plea agreement) or his incapacity to assist his own attorneys. See, e.g., Graham, 560 U. S., at ___ (slip op., at 27) (“[T]he features that distinguish juveniles from adults also put them at a significant disadvantage in criminal proceedings”); J. D. B. v. North Carolina, 564 U. S. ___, ___ (2011) (slip op., at 5–6) (discussing children’s responses to interrogation). And finally, this mandatory punishment disregards the possibility of rehabilitation even when the circumstances most suggest it. Both cases before us illustrate the problem. Take Jack- son’s first. As noted earlier, Jackson did not fire the bullet that killed Laurie Troup; nor did the State argue that he intended her death. Jackson’s conviction was instead based on an aiding-and-abetting theory; and the appellate court affirmed the verdict only because the jury could have believed that when Jackson entered the store, he warned Troup that “[w]e ain’t playin’,” rather than told his friends that “I thought you all was playin’.” See 359 Ark., at 90–92, 194 S. W. 3d, at 759–760; supra, at 2. To be sure, Jackson learned on the way to the video store that his 16 MILLER v. ALABAMA Opinion of the Court friend Shields was carrying a gun, but his age could well have affected his calculation of the risk that posed, as well as his willingness to walk away at that point. All these circumstances go to Jackson’s culpability for the offense. See Graham, 560 U. S., at ___ (slip op., at 18) (“[W]hen compared to an adult murderer, a juvenile offender who did not kill or intend to kill has a twice diminished moral culpability”). And so too does Jackson’s family background and immersion in violence: Both his mother and his grandmother had previously shot other individuals. See Record in No. 10–9647, pp. 80–82. At the least, a sen- tencer should look at such facts before depriving a 14- year-old of any prospect of release from prison. That is true also in Miller’s case. No one can doubt that he and Smith committed a vicious murder. But they did it when high on drugs and alcohol consumed with the adult victim. And if ever a pathological background might have contributed to a 14-year-old’s commission of a crime, it is here. Miller’s stepfather physically abused him; his alco- holic and drug-addicted mother neglected him; he had been in and out of foster care as a result; and he had tried to kill himself four times, the first when he should have been in kindergarten. See 928 So. 2d, at 1081 (Cobb, J., concurring in result); Miller App. 26–28; supra, at 4. Nonetheless, Miller’s past criminal history was limited— two instances of truancy and one of “second-degree crimi- nal mischief.” No. CR–03–0915, at 6 (unpublished memo- randum). That Miller deserved severe punishment for killing Cole Cannon is beyond question. But once again, a sentencer needed to examine all these circumstances before concluding that life without any possibility of parole was the appropriate penalty. We therefore hold that the Eighth Amendment forbids a sentencing scheme that mandates life in prison without possibility of parole for juvenile offenders. Cf. Graham, 560 U. S., at ___ (slip op., at 24) (“A State is not required Cite as: 567 U. S. ____ (2012) 17 Opinion of the Court to guarantee eventual freedom,” but must provide “some meaningful opportunity to obtain release based on demon- strated maturity and rehabilitation”). By making youth (and all that accompanies it) irrelevant to imposition of that harshest prison sentence, such a scheme poses too great a risk of disproportionate punishment. Because that holding is sufficient to decide these cases, we do not con- sider Jackson’s and Miller’s alternative argument that the Eighth Amendment requires a categorical bar on life without parole for juveniles, or at least for those 14 and younger. But given all we have said in Roper, Graham, and this decision about children’s diminished culpability and heightened capacity for change, we think appropriate occasions for sentencing juveniles to this harshest possible penalty will be uncommon. That is especially so because of the great difficulty we noted in Roper and Graham of distinguishing at this early age between “the juvenile of- fender whose crime reflects unfortunate yet transient immaturity, and the rare juvenile offender whose crime reflects irreparable corruption.” Roper, 543 U. S., at 573; Graham, 560 U. S., at ___ (slip op., at 17). Although we do not foreclose a sentencer’s ability to make that judgment in homicide cases, we require it to take into account how children are different, and how those differences coun- sel against irrevocably sentencing them to a lifetime in prison.8 —————— 8 Given our holding, and the dissents’ competing position, we see a certain irony in their repeated references to 17-year-olds who have committed the “most heinous” offenses, and their comparison of those defendants to the 14-year-olds here. See post, at 2 (opinion of ROBERTS, C. J.) (noting the “17-year old [who] is convicted of deliberately murder- ing an innocent victim”); post, at 3 (“the most heinous murders”); post, at 7 (“the worst types of murder”); post, at 5 (opinion of ALITO, J.) (warning the reader not to be “confused by the particulars” of these two cases); post, at 1 (discussing the “171⁄2-year-old who sets off a bomb in a crowded mall”). Our holding requires factfinders to attend to exactly such circumstances—to take into account the differences among de- 18 MILLER v. ALABAMA Opinion of the Court III Alabama and Arkansas offer two kinds of arguments against requiring individualized consideration before sen- tencing a juvenile to life imprisonment without possi- bility of parole. The States (along with the dissents) first contend that the rule we adopt conflicts with aspects of our Eighth Amendment caselaw. And they next assert that the rule is unnecessary because individualized cir- cumstances come into play in deciding whether to try a juvenile offender as an adult. We think the States are wrong on both counts. A The States (along with JUSTICE THOMAS) first claim that Harmelin v. Michigan, 501 U. S. 957 (1991), precludes our holding. The defendant in Harmelin was sentenced to a mandatory life-without-parole term for possessing more than 650 grams of cocaine. The Court upheld that pen- alty, reasoning that “a sentence which is not otherwise cruel and unusual” does not “becom[e] so simply because it is ‘mandatory.’ ” Id., at 995. We recognized that a different rule, requiring individualized sentencing, applied in the death penalty context. But we refused to extend that command to noncapital cases “because of the qualitative difference between death and all other penalties.” Ibid.; see id., at 1006 (KENNEDY, J., concurring in part and concurring in judgment). According to Alabama, invali- dating the mandatory imposition of life-without-parole terms on juveniles “would effectively overrule Harmelin.” Brief for Respondent in No. 10–9646, p. 59 (hereinafter Alabama Brief); see Arkansas Brief 39. We think that argument myopic. Harmelin had nothing to do with children and did not purport to apply its hold- —————— fendants and crimes. By contrast, the sentencing schemes that the dissents find permissible altogether preclude considering these factors. Cite as: 567 U. S. ____ (2012) 19 Opinion of the Court ing to the sentencing of juvenile offenders. We have by now held on multiple occasions that a sentencing rule permissible for adults may not be so for children. Capital punishment, our decisions hold, generally comports with the Eighth Amendment—except it cannot be imposed on children. See Roper, 543 U. S. 551; Thompson, 487 U. S. 815. So too, life without parole is permissible for nonhom- icide offenses—except, once again, for children. See Gra- ham, 560 U. S., at ___ (slip op., at 24). Nor are these sentencing decisions an oddity in the law. To the contrary, “ ‘[o]ur history is replete with laws and judicial recogni- tion’ that children cannot be viewed simply as miniature adults.” J. D. B., 564 U. S., at ___ (slip op., at 10–11) (quoting Eddings, 455 U. S., at 115–116, citing examples from criminal, property, contract, and tort law). So if (as Harmelin recognized) “death is different,” children are different too. Indeed, it is the odd legal rule that does not have some form of exception for children. In that context, it is no surprise that the law relating to society’s harshest punishments recognizes such a distinction. Cf. Graham, 560 U. S., at ___ (ROBERTS, C. J., concurring in judgment) (slip op., at 7) (“Graham’s age places him in a significantly different category from the defendan[t] in . . . Harmelin”). Our ruling thus neither overrules nor undermines nor con- flicts with Harmelin. Alabama and Arkansas (along with THE CHIEF JUS- TICE and JUSTICE ALITO) next contend that because many States impose mandatory life-without-parole sentences on juveniles, we may not hold the practice unconstitutional. In considering categorical bars to the death penalty and life without parole, we ask as part of the analysis whether “ ‘objective indicia of society’s standards, as expressed in legislative enactments and state practice,’ ” show a “na- tional consensus” against a sentence for a particular class of offenders. Graham, 560 U. S., at ___ (slip op., at 10) (quoting Roper, 543 U. S., at 563). By our count, 29 juris- 20 MILLER v. ALABAMA Opinion of the Court dictions (28 States and the Federal Government) make a life-without-parole term mandatory for some juveniles convicted of murder in adult court.9 The States argue that this number precludes our holding. We do not agree; indeed, we think the States’ argument on this score weaker than the one we rejected in Graham. For starters, the cases here are different from the typical one in which we have tallied legislative enactments. Our decision does not categorically bar a penalty for a class of offenders or type of crime—as, for example, we did in Roper or Graham. Instead, it mandates only that a sen- tencer follow a certain process—considering an offender’s youth and attendant characteristics—before imposing a particular penalty. And in so requiring, our decision flows straightforwardly from our precedents: specifically, the principle of Roper, Graham, and our individualized sen- tencing cases that youth matters for purposes of meting out the law’s most serious punishments. When both of those circumstances have obtained in the past, we have not scrutinized or relied in the same way on legislative —————— 9 The States note that 26 States and the Federal Government make life without parole the mandatory (or mandatory minimum) punish- ment for some form of murder, and would apply the relevant provision to 14-year-olds (with many applying it to even younger defendants). See Alabama Brief 17–18. In addition, life without parole is mandatory for older juveniles in Louisiana (age 15 and up) and Texas (age 17). See La. Child. Code Ann., Arts. 857(A), (B) (West Supp. 2012); La. Rev. Stat. Ann. §§14:30(C), 14:30.1(B) (West Supp. 2012); Tex. Family Code Ann. §§51.02(2)(A), 54.02(a)(2)(A) (West Supp. 2011); Tex. Penal Code Ann. §12.31(a) (West 2011). In many of these jurisdictions, life without parole is the mandatory punishment only for aggravated forms of murder. That distinction makes no difference to our analysis. We have consistently held that limiting a mandatory death penalty law to particular kinds of murder cannot cure the law’s “constitutional vice” of disregarding the “circumstances of the particular offense and the character and propensities of the offender.” Roberts v. Louisiana, 428 U. S. 325, 333 (1976) (plurality opinion); see Sumner v. Shuman, 483 U. S. 66 (1987). The same analysis applies here, for the same reasons. Cite as: 567 U. S. ____ (2012) 21 Opinion of the Court enactments. See, e.g., Sumner v. Shuman, 483 U. S. 66 (relying on Woodson’s logic to prohibit the mandatory death penalty for murderers already serving life without parole); Lockett, 438 U. S., at 602–608 (plurality opinion) (applying Woodson to require that judges and juries consider all mitigating evidence); Eddings, 455 U. S., at 110–117 (similar). We see no difference here. In any event, the “objective indicia” that the States offer do not distinguish these cases from others holding that a sentencing practice violates the Eighth Amendment. In Graham, we prohibited life-without-parole terms for juveniles committing nonhomicide offenses even though 39 jurisdictions permitted that sentence. See 560 U. S., at ___ (slip op., at 11). That is 10 more than impose life without parole on juveniles on a mandatory basis.10 And —————— 10 In assessing indicia of societal standards, Graham discussed “ac- tual sentencing practices” in addition to legislative enactments, noting how infrequently sentencers imposed the statutorily available penalty. 560 U. S., at ___ (slip op., at 11). Here, we consider the constitutional- ity of mandatory sentencing schemes—which by definition remove a judge’s or jury’s discretion—so no comparable gap between legislation and practice can exist. Rather than showing whether sentencers consider life without parole for juvenile homicide offenders appropriate, the number of juveniles serving this sentence, see post, at 1, 3–4 (ROBERTS, C. J., dissenting), merely reflects the number who have com- mitted homicide in mandatory-sentencing jurisdictions. For the same reason, THE CHIEF JUSTICE’s comparison of ratios in this case and Gra- ham carries little weight. He contrasts the number of mandatory life-without-parole sentences for juvenile murderers, relative to the number of juveniles arrested for murder, with “the corresponding number” of sentences in Graham (i.e., the number of life-without-parole sentences for juveniles who committed serious nonhomicide crimes, as compared to arrests for those crimes). Post, at 4. But because the mandatory nature of the sentences here necessarily makes them more common, THE CHIEF JUSTICE’s figures do not “correspon[d]” at all. The higher ratio is mostly a function of removing the sentencer’s discretion. Where mandatory sentencing does not itself account for the number of juveniles serving life-without-parole terms, the evidence we have of practice supports our holding. Fifteen jurisdictions make life without 22 MILLER v. ALABAMA Opinion of the Court in Atkins, Roper, and Thompson, we similarly banned the death penalty in circumstances in which “less than half ” of the “States that permit[ted] capital punishment (for whom the issue exist[ed])” had previously chosen to do so. Atkins, 536 U. S., at 342 (SCALIA, J., dissenting) (emphasis deleted); see id., at 313–315 (majority opinion); Roper, 543 U. S., at 564–565; Thompson, 487 U. S., at 826–827 (plu- rality opinion). So we are breaking no new ground in these cases.11 Graham and Thompson provide special guidance, be- cause they considered the same kind of statutes we do and —————— parole discretionary for juveniles. See Alabama Brief 25 (listing 12 States); Cal. Penal Code Ann. §190.5(b) (West 2008); Ind. Code §35–50– 2–3(b) (2011); N. M. Stat. §§31–18–13(B), 31–18–14, 31–18–15.2 (2010). According to available data, only about 15% of all juvenile life-without- parole sentences come from those 15 jurisdictions, while 85% come from the 29 mandatory ones. See Tr. of Oral Arg. in No. 10–9646, p. 19; Human Rights Watch, State Distribution of Youth Offenders Serv- ing Juvenile Life Without Parole (JLWOP), Oct. 2, 2009, online at http://www.hrw.org/news/2009/10/02/state-distribution-juvenile-offenders- serving-juvenile-life-without-parole (as visited June 21, 2012, and available in Clerk of Court’s case file). That figure indicates that when given the choice, sentencers impose life without parole on children relatively rarely. And contrary to THE CHIEF JUSTICE’s argument, see post, at 5, n. 2, we have held that when judges and juries do not often choose to impose a sentence, it at least should not be mandatory. See Woodson v. North Carolina, 428 U. S. 280, 295–296 (1976) (plurality opinion) (relying on the infrequency with which juries imposed the death penalty when given discretion to hold that its mandatory imposi- tion violates the Eighth Amendment). 11 In response, THE CHIEF JUSTICE complains: “To say that a sentence may be considered unusual because so many legislatures approve it stands precedent on its head.” Post, at 5. To be clear: That description in no way resembles our opinion. We hold that the sentence violates the Eighth Amendment because, as we have exhaustively shown, it conflicts with the fundamental principles of Roper, Graham, and our individualized sentencing cases. We then show why the number of States imposing this punishment does not preclude our holding, and note how its mandatory nature (in however many States adopt it) makes use of actual sentencing numbers unilluminating. Cite as: 567 U. S. ____ (2012) 23 Opinion of the Court explained why simply counting them would present a distorted view. Most jurisdictions authorized the death penalty or life without parole for juveniles only through the combination of two independent statutory provisions. One allowed the transfer of certain juvenile offenders to adult court, while another (often in a far-removed part of the code) set out the penalties for any and all individuals tried there. We reasoned that in those circumstances, it was impossible to say whether a legislature had endorsed a given penalty for children (or would do so if presented with the choice). In Thompson, we found that the statutes “t[old] us that the States consider 15-year-olds to be old enough to be tried in criminal court for serious crimes (or too old to be dealt with effectively in juvenile court), but t[old] us nothing about the judgment these States have made regarding the appropriate punishment for such youthful offenders.” 487 U. S., at 826, n. 24 (plurality opinion) (emphasis deleted); see also id., at 850 (O’Connor, J., concurring in judgment); Roper, 543 U. S., at 596, n. (O’Connor, J., dissenting). And Graham echoed that reasoning: Although the confluence of state laws “ma[de] life without parole possible for some juvenile nonhomicide offenders,” it did not “justify a judgment” that many States actually “intended to subject such offenders” to those sentences. 560 U. S., at ___ (slip op., at 16).12 All that is just as true here. Almost all jurisdictions allow some juveniles to be tried in adult court for some —————— 12 THE CHIEF JUSTICE attempts to distinguish Graham on this point, arguing that there “the extreme rarity with which the sentence in question was imposed could suggest that legislatures did not really intend the inevitable result of the laws they passed.” Post, at 6. But neither Graham nor Thompson suggested such reasoning, presumably because the time frame makes it difficult to comprehend. Those cases considered what legislators intended when they enacted, at different moments, separate juvenile-transfer and life-without-parole provi- sions—by definition, before they knew or could know how many juve- nile life-without-parole sentences would result. 24 MILLER v. ALABAMA Opinion of the Court kinds of homicide. See Dept. of Justice, H. Snyder & M. Sickmund, Juvenile Offenders and Victims: 2006 National Report 110–114 (hereinafter 2006 National Report). But most States do not have separate penalty provisions for those juvenile offenders. Of the 29 jurisdictions mandat- ing life without parole for children, more than half do so by virtue of generally applicable penalty provisions, im- posing the sentence without regard to age.13 And indeed, some of those States set no minimum age for who may be transferred to adult court in the first instance, thus apply- ing life-without-parole mandates to children of any age— be it 17 or 14 or 10 or 6.14 As in Graham, we think that “underscores that the statutory eligibility of a juvenile offender for life without parole does not indicate that the penalty has been endorsed through deliberate, express, and full legislative consideration.” 560 U. S., at ___ (slip —————— 13 See Ala. Code §§13A–5–45(f), 13A–6–2(c) (2005 and Cum. Supp. 2011); Ariz. Rev. Stat. Ann. §13–752 (West 2010), §41–1604.09(I) (West 2011); Conn. Gen. Stat. §53a–35a(1) (2011); Del. Code Ann., Tit. 11, §4209(a) (2007); Fla. Stat. §775.082(1) (2010); Haw. Rev. Stat. §706– 656(1) (1993); Idaho Code §18–4004 (Lexis 2004); Mich. Comp. Laws Ann. §791.234(6)(a) (West Cum. Supp. 2012); Minn. Stat. Ann. §§609.106, subd. 2 (West 2009); Neb. Rev. Stat. §29–2522 (2008); N. H. Rev. Stat. Ann. §630:1–a (West 2007); 18 Pa. Cons. Stat. §§1102(a), (b), 61 Pa. Cons. Stat. §6137(a)(1) (Supp. 2012); S. D. Codified Laws §22-6- 1(1) (2006), §24–15–4 (2004); Vt. Stat. Ann., Tit. 13, §2311(c)(2009); Wash. Rev. Code §10.95.030(1) (2010). 14 See Del. Code Ann., Tit. 10, §1010 (1999 and Cum. Supp. 2010), Tit. 11, §4209(a) (2007); Fla. Stat. §985.56 (2010), 775.082(1); Haw. Rev. Stat. §571–22(d) (1993), §706–656(1); Idaho Code §§20–508, 20–509 (Lexis Cum. Supp. 2012), §18–4004; Mich. Comp. Laws Ann. §712A.2d (West 2009), §791.234(6)(a); Neb. Rev. Stat. §§43–247, 29–2522 (2008); 42 Pa. Cons. Stat. §6355(e) (2000), 18 Pa. Cons. Stat. §1102. Other States set ages between 8 and 10 as the minimum for transfer, thus exposing those young children to mandatory life without parole. See S. D. Codified Laws §§26–8C–2, 26–11–4 (2004), §22–6–1 (age 10); Vt. Stat. Ann., Tit. 33, §5204 (2011 Cum. Supp.), Tit. 13, §2311(a) (2009) (age 10); Wash. Rev. Code §§9A.04.050, 13.40.110 (2010), §10.95.030 (age 8). Cite as: 567 U. S. ____ (2012) 25 Opinion of the Court op., at 16). That Alabama and Arkansas can count to 29 by including these possibly (or probably) inadvertent legislative outcomes does not preclude our determination that mandatory life without parole for juveniles violates the Eighth Amendment. B Nor does the presence of discretion in some jurisdictions’ transfer statutes aid the States here. Alabama and Ar- kansas initially ignore that many States use mandatory transfer systems: A juvenile of a certain age who has committed a specified offense will be tried in adult court, regardless of any individualized circumstances. Of the 29 relevant jurisdictions, about half place at least some juvenile homicide offenders in adult court automatically, with no apparent opportunity to seek transfer to juvenile court.15 Moreover, several States at times lodge this deci- sion exclusively in the hands of prosecutors, again with no statutory mechanism for judicial reevaluation.16 And those “prosecutorial discretion laws are usually silent regarding standards, protocols, or appropriate considera- tions for decisionmaking.” Dept. of Justice, Office of Juve- nile Justice and Delinquency Prevention, P. Griffin, S. Addie, B. Adams, & K. Firestine, Trying Juveniles as —————— 15 See Ala. Code §12–15–204(a) (Cum. Supp. 2011); Ariz. Rev. Stat. Ann. §13–501(A) (West Cum. Supp. 2011); Conn. Gen. Stat. §46b–127 (2011); Ill. Comp. Stat. ch. 705, §§405/5–130(1)(a), (4)(a) (West 2010); La. Child. Code Ann., Art. 305(A) (West Cum. Supp. 2012); Mass. Gen. Laws, ch. 119, §74 (West 2010); Mich. Comp. Laws Ann. §712A.2(a) (West 2002); Minn. Stat. Ann. §260B.007, subd. 6(b) (West Cum. Supp. 2011), §260B.101, subd. 2 (West 2007); Mo. Rev. Stat. §§211.021(1), (2) (2011); N. C. Gen. Stat. Ann. §§7B–1501(7), 7B–1601(a), 7B–2200 (Lexis 2011); N. H. Rev. Stat. Ann. §169–B:2(IV) (West Cum. Supp. 2011), §169–B:3 (West 2010); Ohio Rev. Code Ann. §2152.12(A)(1)(a) (Lexis 2011); Tex. Family Code Ann. §51.02(2); Va. Code Ann. §§16.1– 241(A), 16.1–269.1(B), (D) (Lexis 2010). 16 Fla. Stat. Ann. §985.557(1) (West Supp. 2012); Mich. Comp. Laws Ann. §712A.2(a)(1); Va. Code Ann. §§16.1–241(A), 16.1–269.1(C), (D). 26 MILLER v. ALABAMA Opinion of the Court Adults: An Analysis of State Transfer Laws and Reporting 5 (2011). Even when States give transfer-stage discretion to judges, it has limited utility. First, the decisionmaker typically will have only partial information at this early, pretrial stage about either the child or the circumstances of his offense. Miller’s case provides an example. As noted earlier, see n. 3, supra, the juvenile court denied Miller’s request for his own mental-health expert at the transfer hearing, and the appeals court affirmed on the ground that Miller was not then entitled to the protections and services he would receive at trial. See No. CR–03– 0915, at 3–4 (unpublished memorandum). But by then, of course, the expert’s testimony could not change the sen- tence; whatever she said in mitigation, the mandatory life-without-parole prison term would kick in. The key mo- ment for the exercise of discretion is the transfer—and as Miller’s case shows, the judge often does not know then what she will learn, about the offender or the offense, over the course of the proceedings. Second and still more important, the question at trans- fer hearings may differ dramatically from the issue at a post-trial sentencing. Because many juvenile systems require that the offender be released at a particular age or after a certain number of years, transfer decisions often present a choice between extremes: light punishment as a child or standard sentencing as an adult (here, life without parole). In many States, for example, a child convicted in juvenile court must be released from custody by the age of 21. See, e.g., Ala. Code §12–15–117(a) (Cum. Supp. 2011); see generally 2006 National Report 103 (noting limitations on the length of juvenile court sanctions). Discretionary sentencing in adult court would provide different options: There, a judge or jury could choose, rather than a life- without-parole sentence, a lifetime prison term with the possibility of parole or a lengthy term of years. It is easy Cite as: 567 U. S. ____ (2012) 27 Opinion of the Court to imagine a judge deciding that a minor deserves a (much) harsher sentence than he would receive in juvenile court, while still not thinking life-without-parole appro- priate. For that reason, the discretion available to a judge at the transfer stage cannot substitute for discretion at post-trial sentencing in adult court—and so cannot satisfy the Eighth Amendment. IV Graham, Roper, and our individualized sentencing decisions make clear that a judge or jury must have the opportunity to consider mitigating circumstances before imposing the harshest possible penalty for juveniles. By requiring that all children convicted of homicide receive lifetime incarceration without possibility of parole, regard- less of their age and age-related characteristics and the nature of their crimes, the mandatory sentencing schemes before us violate this principle of proportionality, and so the Eighth Amendment’s ban on cruel and unusual pun- ishment. We accordingly reverse the judgments of the Arkansas Supreme Court and Alabama Court of Criminal Appeals and remand the cases for further proceedings not inconsistent with this opinion. It is so ordered. Cite as: 567 U. S. ____ (2012) 1 BREYER, J., concurring SUPREME COURT OF THE UNITED STATES _________________ Nos. 10–9646 and 10–9647 _________________ EVAN MILLER, PETITIONER 10–9646 v. ALABAMA ON WRIT OF CERTIORARI TO THE COURT OF CRIMINAL APPEALS OF ALABAMA KUNTRELL JACKSON, PETITIONER 10–9647 v. RAY HOBBS, DIRECTOR, ARKANSAS DEPARTMENT OF CORRECTION ON WRIT OF CERTIORARI TO THE SUPREME COURT OF ARKANSAS [June 25, 2012] JUSTICE BREYER, with whom JUSTICE SOTOMAYOR joins, concurring. I join the Court’s opinion in full. I add that, if the State continues to seek a sentence of life without the possibil- ity of parole for Kuntrell Jackson, there will have to be a determination whether Jackson “kill[ed] or intend[ed] to kill” the robbery victim. Graham v. Florida, 560 U. S. ___, ___ (2010) (slip op., at 18). In my view, without such a finding, the Eighth Amendment as interpreted in Graham forbids sentencing Jackson to such a sentence, regardless of whether its application is mandatory or discretionary under state law. In Graham we said that “when compared to an adult murderer, a juvenile offender who did not kill or intend to kill has a twice diminished moral culpability.” Ibid. (em- phasis added). For one thing, “compared to adults, juve- niles have a lack of maturity and an underdeveloped sense 2 MILLER v. ALABAMA BREYER, J., concurring of responsibility; they are more vulnerable or susceptible to negative influences and outside pressures, including peer pressure; and their characters are not as well formed.” Id., at ___ (slip op., at 17) (internal quotation marks omitted). See also ibid. (“[P]sychology and brain science continue to show fundamental differences between juvenile and adult minds” making their actions “less likely to be evidence of ‘irretrievably depraved character’ than are the actions of adults” (quoting Roper v. Simmons, 543 U. S. 551, 570 (2005))); ante, at 8–9. For another thing, Graham recognized that lack of intent normally dimin- ishes the “moral culpability” that attaches to the crime in question, making those that do not intend to kill “categori- cally less deserving of the most serious forms of punish- ment than are murderers.” 560 U. S., at ___ (slip op., at 18) (citing Kennedy v. Louisiana, 554 U. S. 407, 434–435 (2008); Enmund v. Florida, 458 U. S. 782 (1982); Tison v. Arizona, 481 U. S. 137 (1987)). And we concluded that, because of this “twice diminished moral culpability,” the Eighth Amendment forbids the imposition upon juveniles of a sentence of life without parole for nonhomicide cases. Graham, supra, at ___, ___ (slip op., at 18, 32). Given Graham’s reasoning, the kinds of homicide that can subject a juvenile offender to life without parole must exclude instances where the juvenile himself neither kills nor intends to kill the victim. Quite simply, if the juvenile either kills or intends to kill the victim, he lacks “twice diminished” responsibility. But where the juvenile neither kills nor intends to kill, both features emphasized in Gra- ham as extenuating apply. The dissent itself here would permit life without parole for “juveniles who commit the worst types of murder,” post, at 7 (opinion of ROBERTS, C. J.), but that phrase does not readily fit the culpability of one who did not himself kill or intend to kill. I recognize that in the context of felony-murder cases, the question of intent is a complicated one. The felony- Cite as: 567 U. S. ____ (2012) 3 BREYER, J., concurring murder doctrine traditionally attributes death caused in the course of a felony to all participants who intended to commit the felony, regardless of whether they killed or intended to kill. See 2 W. LaFave, Substantive Criminal Law §§14.5(a) and (c) (2d ed. 2003). This rule has been based on the idea of “transferred intent”; the defendant’s intent to commit the felony satisfies the intent to kill required for murder. See S. Kadish, S. Schulhofer, & C. Streiker, Criminal Law and Its Processes 439 (8th ed. 2007); 2 C. Torcia, Wharton’s Criminal Law §147 (15th ed. 1994). But in my opinion, this type of “transferred intent” is not sufficient to satisfy the intent to murder that could subject a juvenile to a sentence of life without parole. As an initial matter, this Court has made clear that this artificially constructed kind of intent does not count as intent for purposes of the Eighth Amendment. We do not rely on transferred intent in determining if an adult may receive the death penalty. Thus, the Constitution forbids imposing capital punishment upon an aider and abettor in a robbery, where that individual did not intend to kill and simply was “in the car by the side of the road . . . , waiting to help the robbers escape.” Enmund, supra, at 788. Cf. Tison, supra, at 157–158 (capital punishment permissi- ble for aider and abettor where kidnaping led to death because he was “actively involved” in every aspect of the kidnaping and his behavior showed “a reckless disregard for human life”). Given Graham, this holding applies to juvenile sentences of life without parole a fortiori. See ante, at 12–13. Indeed, even juveniles who meet the Tison standard of “reckless disregard” may not be eligible for life without parole. Rather, Graham dictates a clear rule: The only juveniles who may constitutionally be sentenced to life without parole are those convicted of homicide offenses who “kill or intend to kill.” 560 U. S., at ___ (slip op., at 18). 4 MILLER v. ALABAMA BREYER, J., concurring Moreover, regardless of our law with respect to adults, there is no basis for imposing a sentence of life without parole upon a juvenile who did not himself kill or intend to kill. At base, the theory of transferring a defendant’s intent is premised on the idea that one engaged in a dan- gerous felony should understand the risk that the victim of the felony could be killed, even by a confederate. See 2 LaFave, supra, §14.5(c). Yet the ability to consider the full consequences of a course of action and to adjust one’s conduct accordingly is precisely what we know juveniles lack capacity to do effectively. Ante, at 8–9. Justice Frank- furter cautioned, “Legal theories and their phrasing in other cases readily lead to fallacious reasoning if uncrit- ically transferred to a determination of a State’s duty to- ward children.” May v. Anderson, 345 U. S. 528, 536 (1953) (concurring opinion). To apply the doctrine of transferred intent here, where the juvenile did not kill, to sentence a juvenile to life without parole would involve such “fallacious reasoning.” Ibid. This is, as far as I can tell, precisely the situation pres- ent in Kuntrell Jackson’s case. Jackson simply went along with older boys to rob a video store. On the way, he became aware that a confederate had a gun. He initially stayed outside the store, and went in briefly, saying some- thing like “We ain’t playin’ ” or “ ‘I thought you all was playin,’ ” before an older confederate shot and killed the store clerk. Jackson v. State, 359 Ark. 87, 91, 194 S. W. 3d 757, 760 (2004). Crucially, the jury found him guilty of first-degree murder under a statute that permitted them to convict if, Jackson “attempted to commit or committed an aggravated robbery, and, in the course of that of- fense, he, or an accomplice, caused [the clerk’s] death under circumstance manifesting extreme indifference to the value of human life.” Ibid. See Ark. Code Ann. §5–10– 101(a)(1) (1997); ante, at 15. Thus, to be found guilty, Jackson did not need to kill the clerk (it is conceded he did Cite as: 567 U. S. ____ (2012) 5 BREYER, J., concurring not), nor did he need to have intent to kill or even “ex- treme indifference.” As long as one of the teenage accom- plices in the robbery acted with extreme indifference to the value of human life, Jackson could be convicted of capital murder. Ibid. The upshot is that Jackson, who did not kill the clerk, might not have intended to do so either. See Jackson v. Norris, 2011 Ark. 49, at 10, ___ S. W. 3d ___ (Danielson, J., dissenting) (“[A]ny evidence of [Jackson’s] intent to kill was severely lacking”). In that case, the Eighth Amend- ment simply forbids imposition of a life term without the possibility of parole. If, on remand, however, there is a finding that Jackson did intend to cause the clerk’s death, the question remains open whether the Eighth Amend- ment prohibits the imposition of life without parole upon a juvenile in those circumstances as well. Ante, at 17. Cite as: 567 U. S. ____ (2012) 1 ROBERTS, C. J., dissenting SUPREME COURT OF THE UNITED STATES _________________ Nos. 10–9646 and 10–9647 _________________ EVAN MILLER, PETITIONER 10–9646 v. ALABAMA ON WRIT OF CERTIORARI TO THE COURT OF CRIMINAL APPEALS OF ALABAMA KUNTRELL JACKSON, PETITIONER 10–9647 v. RAY HOBBS, DIRECTOR, ARKANSAS DEPARTMENT OF CORRECTION ON WRIT OF CERTIORARI TO THE SUPREME COURT OF ARKANSAS [June 25, 2012] CHIEF JUSTICE ROBERTS, with whom JUSTICE SCALIA, JUSTICE THOMAS, and JUSTICE ALITO join, dissenting. Determining the appropriate sentence for a teenager con- victed of murder presents grave and challenging ques- tions of morality and social policy. Our role, however, is to apply the law, not to answer such questions. The perti- nent law here is the Eighth Amendment to the Constitu- tion, which prohibits “cruel and unusual punishments.” Today, the Court invokes that Amendment to ban a pun- ishment that the Court does not itself characterize as un- usual, and that could not plausibly be described as such. I therefore dissent. The parties agree that nearly 2,500 prisoners are pres- ently serving life sentences without the possibility of pa- role for murders they committed before the age of 18. Brief for Petitioner in No. 10–9647, p. 62, n. 80 (Jackson 2 MILLER v. ALABAMA ROBERTS, C. J., dissenting Brief ); Brief for Respondent in No. 10–9646, p. 30 (Ala- bama Brief ). The Court accepts that over 2,000 of those prisoners received that sentence because it was mandated by a legislature. Ante, at 22, n. 10. And it recognizes that the Federal Government and most States impose such mandatory sentences. Ante, at 19–20. Put simply, if a 17- year-old is convicted of deliberately murdering an innocent victim, it is not “unusual” for the murderer to receive a mandatory sentence of life without parole. That reality should preclude finding that mandatory life imprisonment for juvenile killers violates the Eighth Amendment. Our precedent supports this conclusion. When deter- mining whether a punishment is cruel and unusual, this Court typically begins with “ ‘objective indicia of society’s standards, as expressed in legislative enactments and state practice.’ ” Graham v. Florida, 560 U. S. ___, ___ (2010) (slip op., at 10); see also, e.g., Kennedy v. Louisiana, 554 U. S. 407, 422 (2008); Roper v. Simmons, 543 U. S. 551, 564 (2005). We look to these “objective indicia” to ensure that we are not simply following our own subjective values or beliefs. Gregg v. Georgia, 428 U. S. 153, 173 (1976) (joint opinion of Stewart, Powell, and Stevens, JJ.). Such tangible evidence of societal standards enables us to determine whether there is a “consensus against” a given sentencing practice. Graham, supra, at ___ (slip op., at 10). If there is, the punishment may be regarded as “un- usual.” But when, as here, most States formally require and frequently impose the punishment in question, there is no objective basis for that conclusion. Our Eighth Amendment cases have also said that we should take guidance from “evolving standards of decency that mark the progress of a maturing society.” Ante, at 6 (quoting Estelle v. Gamble, 429 U. S. 97, 102 (1976); inter- nal quotation marks omitted). Mercy toward the guilty can be a form of decency, and a maturing society may abandon harsh punishments that it comes to view as Cite as: 567 U. S. ____ (2012) 3 ROBERTS, C. J., dissenting unnecessary or unjust. But decency is not the same as leniency. A decent society protects the innocent from violence. A mature society may determine that this re- quires removing those guilty of the most heinous murders from its midst, both as protection for its other members and as a concrete expression of its standards of decency. As judges we have no basis for deciding that progress toward greater decency can move only in the direction of easing sanctions on the guilty. In this case, there is little doubt about the direction of society’s evolution: For most of the 20th century, American sentencing practices emphasized rehabilitation of the offender and the availability of parole. But by the 1980’s, outcry against repeat offenders, broad disaffection with the rehabilitative model, and other factors led many legis- latures to reduce or eliminate the possibility of parole, imposing longer sentences in order to punish criminals and prevent them from committing more crimes. See, e.g., Alschuler, The Changing Purposes of Criminal Punish- ment, 70 U. Chi. L. Rev. 1, 1–13 (2003); see generally Crime and Public Policy (J. Wilson & J. Petersilia eds. 2011). Statutes establishing life without parole sentences in particular became more common in the past quarter century. See Baze v. Rees, 553 U. S. 35, 78, and n. 10 (2008) (Stevens, J., concurring in judgment). And the parties agree that most States have changed their laws relatively recently to expose teenage murderers to manda- tory life without parole. Jackson Brief 54–55; Alabama Brief 4–5. The Court attempts to avoid the import of the fact that so many jurisdictions have embraced the sentencing prac- tice at issue by comparing this case to the Court’s prior Eighth Amendment cases. The Court notes that Graham found a punishment authorized in 39 jurisdictions uncon- stitutional, whereas the punishment it bans today is mandated in 10 fewer. Ante, at 21. But Graham went to 4 MILLER v. ALABAMA ROBERTS, C. J., dissenting considerable lengths to show that although theoretically allowed in many States, the sentence at issue in that case was “exceedingly rare” in practice. 560 U. S., at ___ (slip op., at 16). The Court explained that only 123 prisoners in the entire Nation were serving life without parole for nonhomicide crimes committed as juveniles, with more than half in a single State. It contrasted that with statis- tics showing nearly 400,000 juveniles were arrested for serious nonhomicide offenses in a single year. Based on the sentence’s rarity despite the many opportunities to im- pose it, Graham concluded that there was a national consensus against life without parole for juvenile nonhom- icide crimes. Id., at ___ (slip op., at 13–16). Here the number of mandatory life without parole sen- tences for juvenile murderers, relative to the number of juveniles arrested for murder, is over 5,000 times higher than the corresponding number in Graham. There is thus nothing in this case like the evidence of national consen- sus in Graham.1 The Court disregards these numbers, claiming that the prevalence of the sentence in question results from the number of statutes requiring its imposition. Ante, at 21, n. 10. True enough. The sentence at issue is statutorily mandated life without parole. Such a sentence can only result from statutes requiring its imposition. In Graham the Court relied on the low number of actual sentences to explain why the high number of statutes allowing such —————— 1 Graham stated that 123 prisoners were serving life without parole for nonhomicide offenses committed as juveniles, while in 2007 alone 380,480 juveniles were arrested for serious nonhomicide crimes. 560 U. S., at ___ (slip op., at 13–14). I use 2,000 as the number of prisoners serving mandatory life without parole sentences for murders committed as juveniles, because all seem to accept that the number is at least that high. And the same source Graham used reports that 1,170 juveniles were arrested for murder and nonnegligent homicide in 2009. Dept. of Justice, Office of Juvenile Justice and Delinquency Prevention, C. Puzzanchera & B. Adams, Juvenile Arrests 2009, p. 4 (Dec. 2011). Cite as: 567 U. S. ____ (2012) 5 ROBERTS, C. J., dissenting sentences was not dispositive. Here, the Court excuses the high number of actual sentences by citing the high number of statutes imposing it. To say that a sentence may be considered unusual because so many legislatures approve it stands precedent on its head.2 The Court also advances another reason for discounting the laws enacted by Congress and most state legisla- tures. Some of the jurisdictions that impose mandatory life without parole on juvenile murderers do so as a result of two statutes: one providing that juveniles charged with serious crimes may be tried as adults, and another gener- ally mandating that those convicted of murder be impris- oned for life. According to the Court, our cases suggest that where the sentence results from the interaction of two such statutes, the legislature can be considered to have imposed the resulting sentences “inadvertent[ly].” Ante, at 22–25. The Court relies on Graham and Thompson v. Oklahoma, 487 U. S. 815, 826, n. 24 (1988) (plurality opinion), for the proposition that these laws are therefore not valid evidence of society’s views on the punishment at issue. It is a fair question whether this Court should ever assume a legislature is so ignorant of its own laws that it does not understand that two of them interact with each —————— 2 The Court’s reference to discretionary sentencing practices is a dis- traction. See ante, at 21–22, n. 10. The premise of the Court’s decision is that mandatory sentences are categorically different from discretion- ary ones. So under the Court’s own logic, whether discretionary sen- tences are common or uncommon has nothing to do with whether mandatory sentences are unusual. In any event, if analysis of discre- tionary sentences were relevant, it would not provide objective support for today’s decision. The Court states that “about 15% of all juvenile life-without-parole sentences”—meaning nearly 400 sentences—were imposed at the discretion of a judge or jury. Ante, at 22, n. 10. Thus the number of discretionary life without parole sentences for juvenile murderers, relative to the number of juveniles arrested for murder, is about 1,000 times higher than the corresponding number in Graham. 6 MILLER v. ALABAMA ROBERTS, C. J., dissenting other, especially on an issue of such importance as the one before us. But in Graham and Thompson it was at least plausible as a practical matter. In Graham, the extreme rarity with which the sentence in question was imposed could suggest that legislatures did not really intend the inevitable result of the laws they passed. See 560 U. S., at ___ (slip op., at 15–16). In Thompson, the sentencing practice was even rarer—only 20 defendants had received it in the last century. 487 U. S., at 832 (plurality opinion). Perhaps under those facts it could be argued that the leg- islature was not fully aware that a teenager could re- ceive the particular sentence in question. But here the widespread and recent imposition of the sentence makes it implausible to characterize this sentencing practice as a collateral consequence of legislative ignorance.3 Nor do we display our usual respect for elected officials by asserting that legislators have accidentally required 2,000 teenagers to spend the rest of their lives in jail. This is particularly true given that our well-publicized decision in Graham alerted legislatures to the possibility that teenagers were subject to life with parole only because of legislative inadvertence. I am aware of no effort in the wake of Graham to correct any supposed legislative over- sight. Indeed, in amending its laws in response to Gra- ham one legislature made especially clear that it does intend juveniles who commit first-degree murder to re- ceive mandatory life without parole. See Iowa Code Ann. §902.1 (West Cum. Supp. 2012). In the end, the Court does not actually conclude that mandatory life sentences for juvenile murderers are un- usual. It instead claims that precedent “leads to” today’s —————— 3 The Court claims that I “take issue with some or all of these prece- dents” and “seek to relitigate” them. Ante, at 7–8, n. 4. Not so: apply- ing this Court’s cases exactly as they stand, I do not believe they support the Court’s decision in this case. Cite as: 567 U. S. ____ (2012) 7 ROBERTS, C. J., dissenting decision, primarily relying on Graham and Roper. Ante, at 7. Petitioners argue that the reasoning of those cases “compels” finding in their favor. Jackson Brief 34. The Court is apparently unwilling to go so far, asserting only that precedent points in that direction. But today’s deci- sion invalidates the laws of dozens of legislatures and Congress. This Court is not easily led to such a result. See, e.g., United States v. Harris, 106 U. S. 629, 635 (1883) (courts must presume an Act of Congress is constitutional “unless the lack of constitutional authority . . . is clearly demonstrated”). Because the Court does not rely on the Eighth Amendment’s text or objective evidence of society’s standards, its analysis of precedent alone must bear the “heavy burden [that] rests on those who would attack the judgment of the representatives of the people.” Gregg, 428 U. S., at 175. If the Court is unwilling to say that prece- dent compels today’s decision, perhaps it should reconsider that decision. In any event, the Court’s holding does not follow from Roper and Graham. Those cases undoubtedly stand for the proposition that teenagers are less mature, less re- sponsible, and less fixed in their ways than adults—not that a Supreme Court case was needed to establish that. What they do not stand for, and do not even suggest, is that legislators—who also know that teenagers are differ- ent from adults—may not require life without parole for juveniles who commit the worst types of murder. That Graham does not imply today’s result could not be clearer. In barring life without parole for juvenile non- homicide offenders, Graham stated that “[t]here is a line ‘between homicide and other serious violent offenses against the individual.’ ” 560 U. S., at ___ (slip op., at 18) (quoting Kennedy, 554 U. S., at ___ (slip op., at 27)). The whole point of drawing a line between one issue and an- other is to say that they are different and should be treated differently. In other words, the two are in different 8 MILLER v. ALABAMA ROBERTS, C. J., dissenting categories. Which Graham also said: “defendants who do not kill, intend to kill, or foresee that life will be taken are categorically less deserving of the most serious forms of punishment than are murderers.” 560 U. S., at ___ (slip op., at 18) (emphasis added). Of course, to be especially clear that what is said about one issue does not apply to another, one could say that the two issues cannot be com- pared. Graham said that too: “Serious nonhomicide crimes . . . cannot be compared to murder.” Ibid. (internal quotation marks omitted). A case that expressly puts an issue in a different category from its own subject, draws a line between the two, and states that the two should not be compared, cannot fairly be said to control that issue. Roper provides even less support for the Court’s holding. In that case, the Court held that the death penalty could not be imposed for offenses committed by juveniles, no matter how serious their crimes. In doing so, Roper also set itself in a different category than this case, by ex- pressly invoking “special” Eighth Amendment analysis for death penalty cases. 543 U. S., at 568–569. But more importantly, Roper reasoned that the death penalty was not needed to deter juvenile murderers in part because “life imprisonment without the possibility of parole” was available. Id., at 572. In a classic bait and switch, the Court now tells state legislatures that—Roper’s promise notwithstanding—they do not have power to guarantee that once someone commits a heinous murder, he will never do so again. It would be enough if today’s decision proved JUSTICE SCALIA’s prescience in writing that Roper’s “reassurance . . . gives little comfort.” Id., at 623 (dissent- ing opinion). To claim that Roper actually “leads to” re- voking its own reassurance surely goes too far. Today’s decision does not offer Roper and Graham’s false promises of restraint. Indeed, the Court’s opinion suggests that it is merely a way station on the path to further judicial displacement of the legislative role in Cite as: 567 U. S. ____ (2012) 9 ROBERTS, C. J., dissenting prescribing appropriate punishment for crime. The Court’s analysis focuses on the mandatory nature of the sentences in this case. See ante, at 11–17. But then— although doing so is entirely unnecessary to the rule it announces—the Court states that even when a life with- out parole sentence is not mandatory, “we think appropri- ate occasions for sentencing juveniles to this harshest possible penalty will be uncommon.” Ante, at 17. Today’s holding may be limited to mandatory sentences, but the Court has already announced that discretionary life with- out parole for juveniles should be “uncommon”—or, to use a common synonym, “unusual.” Indeed, the Court’s gratuitous prediction appears to be nothing other than an invitation to overturn life without parole sentences imposed by juries and trial judges. If that invitation is widely accepted and such sentences for juvenile offenders do in fact become “uncommon,” the Court will have bootstrapped its way to declaring that the Eighth Amendment absolutely prohibits them. This process has no discernible end point—or at least none consistent with our Nation’s legal traditions. Roper and Graham attempted to limit their reasoning to the circumstances they addressed—Roper to the death penalty, and Graham to nonhomicide crimes. Having cast aside those limits, the Court cannot now offer a credible substi- tute, and does not even try. After all, the Court tells us, “none of what [Graham] said about children . . . is crime- specific.” Ante, at 10. The principle behind today’s deci- sion seems to be only that because juveniles are different from adults, they must be sentenced differently. See ante, at 14–17. There is no clear reason that principle would not bar all mandatory sentences for juveniles, or any juvenile sentence as harsh as what a similarly situated adult would receive. Unless confined, the only stopping point for the Court’s analysis would be never permitting juvenile offenders to be tried as adults. Learning that an 10 MILLER v. ALABAMA ROBERTS, C. J., dissenting Amendment that bars only “unusual” punishments re- quires the abolition of this uniformly established practice would be startling indeed. * * * It is a great tragedy when a juvenile commits murder— most of all for the innocent victims. But also for the mur- derer, whose life has gone so wrong so early. And for society as well, which has lost one or more of its members to deliberate violence, and must harshly punish another. In recent years, our society has moved toward requiring that the murderer, his age notwithstanding, be imprisoned for the remainder of his life. Members of this Court may disagree with that choice. Perhaps science and policy suggest society should show greater mercy to young kill- ers, giving them a greater chance to reform themselves at the risk that they will kill again. See ante, at 8–11. But that is not our decision to make. Neither the text of the Constitution nor our precedent prohibits legislatures from requiring that juvenile murderers be sentenced to life without parole. I respectfully dissent. Cite as: 567 U. S. ____ (2012) 1 THOMAS, J., dissenting SUPREME COURT OF THE UNITED STATES _________________ Nos. 10–9646 and 10–9647 _________________ EVAN MILLER, PETITIONER 10–9646 v. ALABAMA ON WRIT OF CERTIORARI TO THE COURT OF CRIMINAL APPEALS OF ALABAMA KUNTRELL JACKSON, PETITIONER 10–9647 v. RAY HOBBS, DIRECTOR, ARKANSAS DEPARTMENT OF CORRECTION ON WRIT OF CERTIORARI TO THE SUPREME COURT OF ARKANSAS [June 25, 2012] JUSTICE THOMAS, with whom JUSTICE SCALIA joins, dissenting. Today, the Court holds that “mandatory life without parole for those under the age of 18 at the time of their crimes violates the Eighth Amendment’s prohibition on ‘cruel and unusual punishments.’ ” Ante, at 2. To reach that result, the Court relies on two lines of precedent. The first involves the categorical prohibition of certain pun- ishments for specified classes of offenders. The second requires individualized sentencing in the capital punish- ment context. Neither line is consistent with the original understanding of the Cruel and Unusual Punishments Clause. The Court compounds its errors by combining these lines of precedent and extending them to reach a result that is even less legitimate than the foundation on which it is built. Because the Court upsets the legislatively enacted sentencing regimes of 29 jurisdictions without 2 MILLER v. ALABAMA THOMAS, J., dissenting constitutional warrant, I respectfully dissent.1 I The Court first relies on its cases “adopt[ing] categorical bans on sentencing practices based on mismatches be- tween the culpability of a class of offenders and the severity of a penalty.” Ante, at 6–7. Of these categorical propor- tionality cases, the Court places particular emphasis on Roper v. Simmons, 543 U. S. 551 (2005), and Graham v. Florida, 560 U. S. ___ (2010). In Roper, the Court held that the Constitution prohibits the execution of an offender who was under 18 at the time of his offense. 543 U. S., at 578. The Roper Court looked to, among other things, its own sense of parental intuition and “scientific and socio- logical studies” to conclude that offenders under the age of 18 “cannot with reliability be classified among the worst offenders.” Id., at 569. In Graham, the Court relied on similar considerations to conclude that the Constitution prohibits a life-without-parole sentence for a nonhomicide offender who was under the age of 18 at the time of his offense. 560 U. S., at ___ (slip op., at 24). The Court now concludes that mandatory life-without- parole sentences for duly convicted juvenile murderers “contraven[e] Graham’s (and also Roper’s) foundational principle: that imposition of a State’s most severe penal- ties on juvenile offenders cannot proceed as though they were not children.” Ante, at 11–12. But neither Roper nor Graham held that specific procedural rules are required for sentencing juvenile homicide offenders. And, the logic of those cases should not be extended to create such a requirement. The Eighth Amendment, made applicable to the States by the Fourteenth Amendment, provides that: “Excessive —————— 1 I join THE CHIEF JUSTICE’s opinion because it accurately explains that, even accepting the Court’s precedents, the Court’s holding in today’s cases is unsupportable. Cite as: 567 U. S. ____ (2012) 3 THOMAS, J., dissenting bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishments inflicted.” As I have previously explained, “the Cruel and Unusual Punish- ments Clause was originally understood as prohibiting torturous methods of punishment—specifically methods akin to those that had been considered cruel and unusual at the time the Bill of Rights was adopted.” Graham, supra, at ___ (dissenting opinion) (slip op., at 3) (internal quotation marks and citations omitted).2 The clause does not contain a “proportionality principle.” Ewing v. Cali- fornia, 538 U. S. 11, 32 (2003) (THOMAS, J., concurring in judgment); see generally Harmelin v. Michigan, 501 U. S. 957, 975–985 (1991) (opinion of SCALIA, J.). In short, it does not authorize courts to invalidate any punishment they deem disproportionate to the severity of the crime or to a particular class of offenders. Instead, the clause “leaves the unavoidably moral question of who ‘deserves’ a particular nonprohibited method of punishment to the judgment of the legislatures that authorize the penalty.” Graham, supra, at ___ (THOMAS, J., dissenting) (slip op., at 5). The legislatures of Arkansas and Alabama, like those of 27 other jurisdictions, ante, at 19–20, have determined —————— 2 Neither the Court nor petitioners argue that petitioners’ sentences would have been among “the ‘modes or acts of punishment that had been considered cruel and unusual at the time that the Bill of Rights was adopted.’ ” Graham, 560 U. S., at ___ (THOMAS, J., dissenting) (slip op., at 10, n. 3) (quoting Ford v. Wainwright, 477 U. S. 399, 405 (1986)). Nor could they. Petitioners were 14 years old at the time they commit- ted their crimes. When the Bill of Rights was ratified, 14-year-olds were subject to trial and punishment as adult offenders. See Roper v. Simmons, 543 U. S. 551, 609, n. 1 (2005) (SCALIA, J., dissenting). Further, mandatory death sentences were common at that time. See Harmelin v. Michigan, 501 U. S. 957, 994–995 (1991). It is therefore implausible that a 14-year-old’s mandatory prison sentence—of any length, with or without parole—would have been viewed as cruel and unusual. 4 MILLER v. ALABAMA THOMAS, J., dissenting that all offenders convicted of specified homicide offenses, whether juveniles or not, deserve a sentence of life in prison without the possibility of parole. Nothing in our Constitution authorizes this Court to supplant that choice. II To invalidate mandatory life-without-parole sentences for juveniles, the Court also relies on its cases “prohib- it[ing] mandatory imposition of capital punishment.” Ante, at 7. The Court reasons that, because Graham compared juvenile life-without-parole sentences to the death penalty, the “distinctive set of legal rules” that this Court has imposed in the capital punishment context, including the requirement of individualized sentencing, is “relevant” here. Ante, at 12–13. But even accepting an analogy between capital and juvenile life-without-parole sentences, this Court’s cases prohibiting mandatory capi- tal sentencing schemes have no basis in the original un- derstanding of the Eighth Amendment, and, thus, cannot justify a prohibition of sentencing schemes that mandate life-without-parole sentences for juveniles. A In a line of cases following Furman v. Georgia, 408 U. S. 238 (1972) (per curiam), this Court prohibited the manda- tory imposition of the death penalty. See Woodson v. North Carolina, 428 U. S. 280 (1976) (plurality opinion); Roberts v. Louisiana, 428 U. S. 325 (1976) (same); Sumner v. Shuman, 483 U. S. 66 (1987). Furman first announced the principle that States may not permit sentencers to exercise unguided discretion in imposing the death pen- alty. See generally 408 U. S. 238. In response to Furman, many States passed new laws that made the death pen- alty mandatory following conviction of specified crimes, thereby eliminating the offending discretion. See Gregg v. Georgia, 428 U. S. 153, 180–181 (1976) (joint opinion Cite as: 567 U. S. ____ (2012) 5 THOMAS, J., dissenting of Stewart, Powell, and Stevens, JJ.). The Court invali- dated those statutes in Woodson, Roberts, and Sumner. The Court reasoned that mandatory capital sentencing schemes were problematic, because they failed “to allow the particularized consideration” of “relevant facets of the character and record of the individual offender or the circumstances of the particular offense.” Woodson, supra, at 303–304 (plurality opinion).3 In my view, Woodson and its progeny were wrongly decided. As discussed above, the Cruel and Unusual Punishments Clause, as originally understood, prohibits “torturous methods of punishment.” See Graham, 560 U. S., at ___ (THOMAS, J., dissenting) (slip op., at 3) (inter- nal quotation marks omitted). It is not concerned with whether a particular lawful method of punishment— whether capital or noncapital—is imposed pursuant to a mandatory or discretionary sentencing regime. See Gard- ner v. Florida, 430 U. S. 349, 371 (1977) (Rehnquist, J., dissenting) (“The prohibition of the Eighth Amendment relates to the character of the punishment, and not to the process by which it is imposed”). In fact, “[i]n the early days of the Republic,” each crime generally had a defined punishment “prescribed with specificity by the legisla- ture.” United States v. Grayson, 438 U. S. 41, 45 (1978). Capital sentences, to which the Court analogizes, were —————— 3 The Court later extended Woodson, requiring that capital defend- ants be permitted to present, and sentencers in capital cases be permit- ted to consider, any relevant mitigating evidence, including the age of the defendant. See, e.g., Lockett v. Ohio, 438 U. S. 586, 597–608 (1978) (plurality opinion); Eddings v. Oklahoma, 455 U. S. 104, 110–112 (1982); Skipper v. South Carolina, 476 U. S. 1, 4–5 (1986); Johnson v. Texas, 509 U. S. 350, 361–368 (1993). Whatever the validity of the requirement that sentencers be permitted to consider all mitigating evidence when deciding whether to impose a nonmandatory capital sentence, the Court certainly was wrong to prohibit mandatory capital sentences. See Graham v. Collins, 506 U. S. 461, 488–500 (1993) (THOMAS, J., concurring). 6 MILLER v. ALABAMA THOMAS, J., dissenting treated no differently. “[M]andatory death sentences abounded in our first Penal Code” and were “common in the several States—both at the time of the founding and throughout the 19th century.” Harmelin, 501 U. S., at 994–995; see also Woodson, supra, at 289 (plurality opin- ion) (“At the time the Eighth Amendment was adopted in 1791, the States uniformly followed the common-law practice of making death the exclusive and mandatory sentence for certain specified offenses”). Accordingly, the idea that the mandatory imposition of an otherwise- constitutional sentence renders that sentence cruel and unusual finds “no support in the text and history of the Eighth Amendment.” Harmelin, supra, at 994. Moreover, mandatory death penalty schemes were “a perfectly reasonable legislative response to the concerns expressed in Furman” regarding unguided sentencing discretion, in that they “eliminat[ed] explicit jury discre- tion and treat[ed] all defendants equally.” Graham v. Collins, 506 U. S. 461, 487 (1993) (THOMAS, J., concur- ring). And, as Justice White explained more than 30 years ago, “a State is not constitutionally forbidden to provide that the commission of certain crimes conclusively estab- lishes that a criminal’s character is such that he deserves death.” Roberts, supra, at 358 (dissenting opinion). Thus, there is no basis for concluding that a mandatory capi- tal sentencing scheme is unconstitutional. Because the Court’s cases requiring individualized sentencing in the capital context are wrongly decided, they cannot serve as a valid foundation for the novel rule regarding mandatory life-without-parole sentences for juveniles that the Court announces today. B In any event, this Court has already declined to extend its individualized-sentencing rule beyond the death pen- alty context. In Harmelin, the defendant was convicted of Cite as: 567 U. S. ____ (2012) 7 THOMAS, J., dissenting possessing a large quantity of drugs. 501 U. S., at 961 (opinion of SCALIA, J.). In accordance with Michigan law, he was sentenced to a mandatory term of life in prison without the possibility of parole. Ibid. Citing the same line of death penalty precedents on which the Court relies today, the defendant argued that his sentence, due to its mandatory nature, violated the Cruel and Unusual Pun- ishments Clause. Id., at 994–995 (opinion of the Court). The Court rejected that argument, explaining that “[t]here can be no serious contention . . . that a sentence which is not otherwise cruel and unusual becomes so sim- ply because it is ‘mandatory.’ ” Id., at 995. In so doing, the Court refused to analogize to its death penalty cases. The Court noted that those cases had “repeatedly suggested that there is no comparable [individualized-sentencing] requirement outside the capital context, because of the qualitative difference between death and all other penal- ties.” Ibid. The Court observed that, “even where the difference” between a sentence of life without parole and other sentences of imprisonment “is the greatest,” such a sentence “cannot be compared with death.” Id., at 996. Therefore, the Court concluded that the line of cases re- quiring individualized sentencing had been drawn at cap- ital cases, and that there was “no basis for extending it further.” Ibid. Harmelin’s reasoning logically extends to these cases. Obviously, the younger the defendant, “the great[er]” the difference between a sentence of life without parole and other terms of imprisonment. Ibid. But under Harmelin’s rationale, the defendant’s age is immaterial to the Eighth Amendment analysis. Thus, the result in today’s cases should be the same as that in Harmelin. Petitioners, like the defendant in Harmelin, were not sentenced to death. Accordingly, this Court’s cases “creating and clarifying the individualized capital sentencing doctrine” do not apply. Id., at 995 (internal quotation marks omitted). 8 MILLER v. ALABAMA THOMAS, J., dissenting Nothing about our Constitution, or about the qualitative difference between any term of imprisonment and death, has changed since Harmelin was decided 21 years ago. What has changed (or, better yet, “evolved”) is this Court’s ever-expanding line of categorical proportionality cases. The Court now uses Roper and Graham to jettison Har- melin’s clear distinction between capital and noncapital cases and to apply the former to noncapital juvenile of- fenders.4 The Court’s decision to do so is even less sup- portable than the precedents used to reach it. III As THE CHIEF JUSTICE notes, ante, at 8–9 (dissenting opinion), the Court lays the groundwork for future incur- sions on the States’ authority to sentence criminals. In its categorical proportionality cases, the Court has considered “ ‘objective indicia of society’s standards, as expressed in legislative enactments and state practice’ to determine whether there is a national consensus against the sentenc- ing practice at issue.” Graham, 560 U. S., at ___ (slip op., at 10) (quoting Roper, 543 U. S., at 563). In Graham, for example, the Court looked to “[a]ctual sentencing prac- tices” to conclude that there was a national consensus against life-without-parole sentences for juvenile nonhom- icide offenders. 560 U. S., at ___ (slip op., at 11–14); see also Roper, supra, at 564–565; Atkins v. Virginia, 536 U. S. 304, 316 (2002). Today, the Court makes clear that, even though its —————— 4 In support of its decision not to apply Harmelin to juvenile offend- ers, the Court also observes that “ ‘[o]ur history is replete with laws and judicial recognition that children cannot be viewed simply as miniature adults.’ ” Ante, at 19 (quoting J. D. B. v. North Carolina, 564 U. S. ___, ___ (2011) (slip op., at 10–11) (some internal quotation marks omitted)). That is no doubt true as a general matter, but it does not justify usurp- ing authority that rightfully belongs to the people by imposing a consti- tutional rule where none exists. Cite as: 567 U. S. ____ (2012) 9 THOMAS, J., dissenting decision leaves intact the discretionary imposition of life- without-parole sentences for juvenile homicide offenders, it “think[s] appropriate occasions for sentencing juveniles to [life without parole] will be uncommon.” Ante, at 17. That statement may well cause trial judges to shy away from imposing life without parole sentences and embolden appellate judges to set them aside when they are imposed. And, when a future petitioner seeks a categorical ban on sentences of life without parole for juvenile homicide offenders, this Court will most assuredly look to the “actual sentencing practices” triggered by this case. The Court has, thus, gone from “merely” divining the societal consen- sus of today to shaping the societal consensus of tomorrow. * * * Today’s decision invalidates a constitutionally permissi- ble sentencing system based on nothing more than the Court’s belief that “its own sense of morality . . . pre-empts that of the people and their representatives.” Graham, supra, at ___ (THOMAS, J., dissenting) (slip op., at 29). Because nothing in the Constitution grants the Court the authority it exercises today, I respectfully dissent. Cite as: 567 U. S. ____ (2012) 1 ALITO, J., dissenting SUPREME COURT OF THE UNITED STATES _________________ Nos. 10–9646 and 10–9647 _________________ EVAN MILLER, PETITIONER 10–9646 v. ALABAMA ON WRIT OF CERTIORARI TO THE COURT OF CRIMINAL APPEALS OF ALABAMA KUNTRELL JACKSON, PETITIONER 10–9647 v. RAY HOBBS, DIRECTOR, ARKANSAS DEPARTMENT OF CORRECTION ON WRIT OF CERTIORARI TO THE SUPREME COURT OF ARKANSAS [June 25, 2012] JUSTICE ALITO, with whom JUSTICE SCALIA joins, dissenting. The Court now holds that Congress and the legislatures of the 50 States are prohibited by the Constitution from identifying any category of murderers under the age of 18 who must be sentenced to life imprisonment without parole. Even a 17½-year-old who sets off a bomb in a crowded mall or guns down a dozen students and teach- ers is a “child” and must be given a chance to persuade a judge to permit his release into society. Nothing in the Constitution supports this arrogation of legislative authority. The Court long ago abandoned the original meaning of the Eighth Amendment, holding instead that the prohi- bition of “cruel and unusual punishment” embodies the “evolving standards of decency that mark the progress of a maturing society.” Trop v. Dulles, 356 U. S. 86, 101 (1958) 2 MILLER v. ALABAMA ALITO, J., dissenting (plurality opinion); see also Graham v. Florida, 560 U. S. ___, ___ (2010) (slip op., at 7); Kennedy v. Louisiana, 554 U. S. 407, 419 (2008); Roper v. Simmons, 543 U. S. 551, 560–561 (2005); Atkins v. Virginia, 536 U. S. 304, 311–312 (2002); Hudson v. McMillian, 503 U. S. 1, 8 (1992); Ford v. Wainwright, 477 U. S. 399, 406 (1986); Rhodes v. Chap- man, 452 U. S. 337, 346 (1981); Estelle v. Gamble, 429 U. S. 97, 102 (1976). Both the provenance and philosoph- ical basis for this standard were problematic from the start. (Is it true that our society is inexorably evolving in the direction of greater and greater decency? Who says so, and how did this particular philosophy of history find its way into our fundamental law? And in any event, aren’t elected representatives more likely than unaccount­ able judges to reflect changing societal standards?) But at least at the start, the Court insisted that these “evolving standards” represented something other than the personal views of five Justices. See Rummel v. Estelle, 445 U. S. 263, 275 (1980) (explaining that “the Court’s Eighth Amendment judgments should neither be nor appear to be merely the subjective views of individual Justices”). In- stead, the Court looked for objective indicia of our society’s moral standards and the trajectory of our moral “evolu­ tion.” See id., at 274–275 (emphasizing that “ ‘judgment should be informed by objective factors to the maximum possible extent’ ” (quoting Coker v. Georgia, 433 U. S. 584, 592 (1977) (plurality opinion))). In this search for objective indicia, the Court toyed with the use of public opinion polls, see Atkins, supra, at 316, n. 21, and occasionally relied on foreign law, see Roper v. Simmons, supra, at 575; Enmund v. Florida, 458 U. S. 782, 796, n. 22 (1982); Thompson v. Oklahoma, 487 U. S. 815, 830–831 (1988); Coker, 433 U. S., at 596, n. 10 (plu­ rality opinion). In the main, however, the staple of this inquiry was the tallying of the positions taken by state legislatures. Thus, Cite as: 567 U. S. ____ (2012) 3 ALITO, J., dissenting in Coker, which held that the Eighth Amendment prohib­ its the imposition of the death penalty for the rape of an adult woman, the Court noted that only one State permit­ ted that practice. Id., at 595–596. In Enmund, where the Court held that the Eighth Amendment forbids capital punishment for ordinary felony murder, both federal law and the law of 28 of the 36 States that authorized the death penalty at the time rejected that punishment. 458 U. S., at 789. While the tally in these early cases may be character­ ized as evidence of a national consensus, the evidence became weaker and weaker in later cases. In Atkins, which held that low-IQ defendants may not be sentenced to death, the Court found an anti–death-penalty consen­ sus even though more than half of the States that allowed capital punishment permitted the practice. See 536 U. S., at 342 (SCALIA, J., dissenting) (observing that less than half of the 38 States that permit capital punishment have enacted legislation barring execution of the mentally retarded). The Court attempted to get around this prob­ lem by noting that there was a pronounced trend against this punishment. See id., at 313–315 (listing 18 States that had amended their laws since 1986 to prohibit the execution of mentally retarded persons). The importance of trend evidence, however, was not long lived. In Roper, which outlawed capital punishment for defendants between the ages of 16 and 18, the lineup of the States was the same as in Atkins, but the trend in favor of abolition—five States during the past 15 years— was less impressive. Roper, 543 U. S., at 564–565. Never­ theless, the Court held that the absence of a strong trend in support of abolition did not matter. See id., at 566 (“Any difference between this case and Atkins with respect to the pace of abolition is thus counterbalanced by the consistent direction of the change”). In Kennedy v. Louisiana, the Court went further. Hold­ 4 MILLER v. ALABAMA ALITO, J., dissenting ing that the Eighth Amendment prohibits capital punish­ ment for the brutal rape of a 12-year-old girl, the Court disregarded a nascent legislative trend in favor of permit- ting capital punishment for this narrowly defined and heinous crime. See 554 U. S., at 433 (explaining that, although “the total number of States to have made child rape a capital offense . . . is six,” “[t]his is not an indication of a trend or change in direction comparable to the one supported by data in Roper”). The Court felt no need to see whether this trend developed further—perhaps be­ cause true moral evolution can lead in only one direction. And despite the argument that the rape of a young child may involve greater depravity than some murders, the Court proclaimed that homicide is categorically different from all (or maybe almost all) other offenses. See id., at 438 (stating that nonhomicide crimes, including child rape, “may be devastating in their harm . . . but in terms of moral depravity and of the injury to the person and to the public, they cannot be compared to murder in their severity and irrevocability” (internal quotation marks and citation omitted)). As the Court had previously put it, “death is different.” Ford, supra, at 411 (plurality opinion). Two years after Kennedy, in Graham v. Florida, any pretense of heeding a legislative consensus was discarded. In Graham, federal law and the law of 37 States and the District of Columbia permitted a minor to be sentenced to life imprisonment without parole for nonhomicide crimes, but despite this unmistakable evidence of a national con­ sensus, the Court held that the practice violates the Eighth Amendment. See 560 U. S., at ___ (THOMAS, J., dissenting) (slip op., at 1–3). The Court, however, drew a distinction between minors who murder and minors who commit other heinous offenses, so at least in that sense the principle that death is different lived on. Today, that principle is entirely put to rest, for here we Cite as: 567 U. S. ____ (2012) 5 ALITO, J., dissenting are concerned with the imposition of a term of imprison­ ment on offenders who kill. The two (carefully selected) cases before us concern very young defendants, and de­ spite the brutality and evident depravity exhibited by at least one of the petitioners, it is hard not to feel sympathy for a 14-year-old sentenced to life without the possibility of release. But no one should be confused by the particulars of the two cases before us. The category of murderers that the Court delicately calls “children” (murderers under the age of 18) consists overwhelmingly of young men who are fast approaching the legal age of adulthood. Evan Miller and Kuntrell Jackson are anomalies; much more typical are murderers like Donald Roper, who committed a brutal thrill-killing just nine months shy of his 18th birthday. Roper, 543 U. S., at 556. Seventeen-year-olds commit a significant number of murders every year,1 and some of these crimes are incred­ ibly brutal. Many of these murderers are at least as ma­ ture as the average 18-year-old. See Thompson, 487 U. S., at 854 (O’Connor, J., concurring in judgment) (noting that maturity may “vary widely among different individuals of the same age”). Congress and the legislatures of 43 States have concluded that at least some of these murderers should be sentenced to prison without parole, and 28 States and the Federal Government have decided that for some of these offenders life without parole should be man­ datory. See Ante, at 20–21, and nn. 9–10. The majority of this Court now overrules these legislative judgments.2 —————— 1 Between 2002 and 2010, 17-year-olds committed an average com­ bined total of 424 murders and nonnegligent homicides per year. See Dept. of Justice, Bureau of Justice Statistics, §4, Arrests, Age of per­ sons arrested (Table 4.7). 2 As the Court noted in Mistretta v. United States, 488 U. S. 361, 366 (1989), Congress passed the Sentencing Reform Act of 1984 to eliminate discretionary sentencing and parole because it concluded that these practices had led to gross abuses. The Senate Report for the 1984 bill 6 MILLER v. ALABAMA ALITO, J., dissenting It is true that, at least for now, the Court apparently permits a trial judge to make an individualized decision that a particular minor convicted of murder should be sentenced to life without parole, but do not expect this possibility to last very long. The majority goes out of its way to express the view that the imposition of a sentence of life without parole on a “child” (i.e., a murderer under the age of 18) should be uncommon. Having held in Gra- ham that a trial judge with discretionary sentencing authority may not impose a sentence of life without parole on a minor who has committed a nonhomicide offense, the Justices in the majority may soon extend that holding to minors who commit murder. We will see. What today’s decision shows is that our Eighth Amend­ ment cases are no longer tied to any objective indicia of society’s standards. Our Eighth Amendment case law is now entirely inward looking. After entirely disregarding objective indicia of our society’s standards in Graham, the Court now extrapolates from Graham. Future cases may extrapolate from today’s holding, and this process may continue until the majority brings sentencing practices into line with whatever the majority views as truly evolved standards of decency. The Eighth Amendment imposes certain limits on the —————— rejected what it called the “outmoded rehabilitation model” for federal criminal sentencing. S. Rep. No. 98–225, p. 38 (1983). According to the Report, “almost everyone involved in the criminal justice system now doubts that rehabilitation can be induced reliably in a prison setting, and it is now quite certain that no one can really detect whether or when a prisoner is rehabilitated.” Ibid. The Report also “observed that the indeterminate-sentencing system had two ‘unjustifi[ed] and ‘shame­ ful’ consequences. The first was the great variation among sentences imposed by different judges upon similarly situated offenders. The second was uncertainty as to the time the offender would spend in prison. Each was a serious impediment to an evenhanded and effective operation of the criminal justice system.” Mistretta, supra, at 366 (quoting S. Rep. No. 98–225, at 38, 65 (citation omitted)). Cite as: 567 U. S. ____ (2012) 7 ALITO, J., dissenting sentences that may be imposed in criminal cases, but for the most part it leaves questions of sentencing policy to be determined by Congress and the state legislatures—and with good reason. Determining the length of imprison­ ment that is appropriate for a particular offense and a particular offender inevitably involves a balancing of in­ terests. If imprisonment does nothing else, it removes the criminal from the general population and prevents him from committing additional crimes in the outside world. When a legislature prescribes that a category of killers must be sentenced to life imprisonment, the legisla­ ture, which presumably reflects the views of the elec­ torate, is taking the position that the risk that these offenders will kill again outweighs any countervailing consideration, including reduced culpability due to imma­ turity or the possibility of rehabilitation. When the major­ ity of this Court countermands that democratic decision, what the majority is saying is that members of society must be exposed to the risk that these convicted murder­ ers, if released from custody, will murder again. Unless our cases change course, we will continue to march toward some vision of evolutionary culmination that the Court has not yet disclosed. The Constitution does not authorize us to take the country on this journey.
{ "pile_set_name": "FreeLaw" }
While conducting such clinical trials, the approval of the Drug Controller General of India (DCGI) is required. “In the application, Nestle mentions that regulatory clearance from DCGI is not required. So, who then monitors such trials? Also, the application does not disclose who all are there in the ethics committee within these hospitals to approve such trials. Are there paediatricians, nutritional experts and what expertise do they have for approving such trials. In fact, the trial was conducted at Calcutta Medical Research Institute even before the in-house ethics committee approved the trial,” underscored Nidhi. “The Ministry has directed ICMR to regulate a trial that is already underway. The question is how are such trials happening under the watch of ICMR? You can’t regulate a trial retrospectively. It has to be done before the trials begin,” explained Dr Sylvia Karpagam, public health doctor and researcher. “This is not the first time that Nestle has tried to enter the market. They don’t follow protocols. They have been trying to bring in un-regulated baby food into the market. This research has not even been approved by an independent ethics committee. Nestle is violating the IMS Act. They should adhere to the law. We are talking about food for infants,” observes Karpagam. “When such trials are held, doctors get monetary benefits. They begin to promote powder food for babies even when it is not necessary. They keep telling the mother that the baby is not being fed well. There is no need for any other liquid or powder for a baby till six months,” says Karpagam. Unregulated clinical trials are a norm in India. “In a report by PricewaterhouseCoopers on emerging markets in India, it had stated that the country is a good ground for clinical trial,” highlighted Karpagam. According to a Supreme Court ruling, clinical trials can be approved in India only in three instances. If it is related to an unmet medical need of the country; In case of innovations vs existing therapy and on basis of the risk benefit analysis. “Nestle’s clinical trials don’t fall under any of these categories. It is not a ‘need’. Here, premature babies are being put at risk. The country spends crores to improve infant mortality rates and here babies are put at risk with this trial. Moreover, Nestle has only commercial interests on its mind,” insists Nidhi.
{ "pile_set_name": "OpenWebText2" }
Q: How to plot in python for count of repeated text I am trying to plot my data-frame using seaborn and matplotlib, but getting error like cannot convert string to float. My data is like: ID | Status | Date | Columns| -------+-------------+------+--------+ 28 | ACTIVE | | | 29 | ACTIVE | | | 49623 | TERMINATED | | | 49624 | TERMINATED | | | 49625 | TERMINATED | | | For what I have tried so far: df_count = df.apply(pd.value_counts) plt.plot(df_count) where df_count looks like |STATUS| -----------+------+ ACTIVE |38537 | TERMINATED |1185 | When trying to do sns.barplot(df) it gives following error: unsupported operand type(s) for +: 'int' and 'str' And trying to do plt.plot(df) it gives following error: ValueError: could not convert string to float: '12/31/2014 0:00' My python plotting seems to be quite zero please suggest. A: I think you have to specify the x and y. Please try: sns.barplot(x=df_count.index,y=df_count.Status) sns.plt.show() -edit test.csv: ,STATUS ACTIVE,38537 TERMINATED,1185 code: import pandas as pd import seaborn as sns df = pd.read_csv('test.csv', delimiter=',') df.index.names = ['Type'] sns.barplot(x=df.index,y=df.STATUS) sns.plt.show() output:
{ "pile_set_name": "StackExchange" }
I have to come clean. Until last week, I was a Curtains virgin. That’s right; the guy who says he’s seen it all didn’t see this one. I really don’t have any excuses. I mean, it was always sitting there on the shelf of our local video store (one of those mom & pop joints that preceded Blockbuster), and even popped up on cable semi-regularly, but, for one reason or another, I just never got around to checking it. But you know what? Now that I’ve seen the flick I’m actually glad it took me the better part of three decades to finally do so. Why? Well, for starters, I don’t think the brain-dead adolescent version of myself had the good taste to appreciate the film for what it is (more on that later), but I’m also pretty damned jazzed that my first exposure to it was through Synapse’s absolutely stunning Blu-ray. Curtains opens with legendary theater actress Samantha Sherwood (Samantha Eggar) performing a bit from “Audra”, the play she’s helped option for her collaborator/director/occasional paramour, Jonathan Stryker (John Vernon). Stryker doesn’t feel that Samantha has the authenticity he wants to see in his main character, so, being the method actor she is, she enlists the director’s help in getting herself institutionalized for a period so that she can truly identify with Audra’s complicated personality. At first, her experiment seems to be working, but, the longer she’s incarcerated, the more she succumbs to her own personal demons, thus leading to a much longer stay than anticipated. In the meantime, Stryker decides to move on with his production, and schedules an intense, weekend-long audition for a select group of actresses. When Samantha gets the news, she escapes from the mental hospital, and makes her way to Stryker’s remote mountain retreat, where the auditions are being held. Stryker is none too pleased by the arrival of Samantha, but, soon, they discover they’ve more to worry about than a washed-up diva as, one by one, the aspiring actresses fall victim to a masked menace hellbent on thinning the competition. Being new to Curtains, I didn’t expect such an elegant and methodically paced thriller; one that shares far more in common with the Italian gialli than the prototypical slasher flick. From its mature protagonists and somewhat soap-ish melodrama to the gorgeous cinematography by Robert Paynter ( who employs lots of nifty camera tricks and bathes scenes in the same sort of colorful theatrical lighting employed by the likes of Bava and Argento). I also found the kills to be very giallo-esque, with the emphasis on style rather than gore (especially the “ice skating” sequence, which is just jaw-droppingly well executed stuff). Performances are also uncharacteristically strong, which is another reason I just can’t lump this one in with the slasher films of the period, which, as any fan will tell you, aren’t known for their master thespians. Eggar and Vernon aren’t B-movie types, and both deliver really nuanced and solid performances that are complimented by the supporting cast of assorted lovelies, especially While the production was a notoriously troubled one – so much so that director Richard Ciupka refused to put his name on it, opting to be credited, instead, as Jonathan Stryker. Despite this, the film is remarkably “whole”, especially in light of the reported reshoots and structural changes, and there’s no noticeable gap in quality or holes in the story (at least no more so than your average genre offering). Synapse Films brings Curtains to Blu-ray with an absolutely GORGEOUS 1.78:1 2K HD transfer that I have no doubt will blow minds. While I’m 34 years late to the party, I have seen stills of the film culled from the various VHS and horrible DVD versions that have been floating around out there, and the difference here is nothing short of astonishing. The image is exceptional in every way, from the vibrant colors and perfectly balanced contrast to the scrumptious amount of fine detail evident in every frame; this is one to write home about, folks. In terms of audio, we’re given two options; the purists 2.0 mono track, as well as a surprisingly authentic sounding 5.1 DTS HD track that manages to retain the vintage vibe while still giving us some well-implemented directional cues and atmospherics. I don’t often recommend these “manufactured” tracks as I’m one of those aforementioned purists, but this one sounds dynamite! Synapse loads up this Special Edition release with a slew of quality bonus features, including a feature-length commentary track with actresses Lesleh Donaldson and Lynne Griffin, as well as an alternate vintage track featuring Samantha Eggar and producer, Peter R. Simpson. We also get a brand new retrospective featurette entitled The Ultimate Nightmare: The Making of Curtains, which includes interviews with Ciupka, Donaldson, Griffin, and many other contributors. It’s a fascinating and in-depth look at what the film was intended to be and what it ultimately became, and the contributors offer some great insight into every facet of making the film, from planning to post-production and release. Another great addition to the set is Gordon Thorne’s vintage piece Ciupka: A Filmmaker in Transition, which sports a lot of behind-the-scenes footage from Curtains. Rounding out the extras is the film’s theatrical trailer. Curtains is an absolute gem. It’s a classy, surprisingly mature, and gorgeously photographed thriller that, in my opinion, owes more to the Italian suspense films of the seventies than to more crowd-pleasing blood and boobs flicks that dominated the multiplexes at the time. Synapse’s Blu-ray presentation is nothing short of perfection, and comes loaded with a fantastic collection of informative and entertaining bonus goodies. Suffice it to say, this one gets my highest recommendation!
{ "pile_set_name": "Pile-CC" }
Q: How to remove ellipsized property of TextView from code? I set my textView to be ellipsezed in xml. Now on click I want it to expend and become not ellipsized. A: Use setEllipsize() to change the ellipsize behavior of a TextView. For example, to turn off ellipsize use this: myTextView.setEllipsize(null);
{ "pile_set_name": "StackExchange" }
--- abstract: 'The dependence of the thermal pressure of hot galactic halos on a model parameter describing the frequency of major reheating episodes during galactic history is investigated. Pressure on the interface between interstellar medium and the halo gas is especially interesting, since empirical evidence here offers one of the simplest constraints on halo models. It is shown that two-phase model of Mo & Miralda-Escudé is sufficiently robust with respect to uncertainties in the average interval between reheating.' author: - 'MILAN M. ĆIRKOVIĆ' title: 'PRESSURE AT THE ISM-HALO INTERFACE: A REHEATING FREQUENCY DEPENDENCE' --- and INTRODUCTION ============ The existence of very extended galactic halos[^1] has been suspected for a long time (Spitzer 1956) on several grounds. In last two and a half decades, from the observations of [*Copernicus*]{} and [*IUE*]{} satellites we have learnt that highly ionized gas exists in the halo of Milky Way to much larger scale-heights than it was previously assumed (for a review, see Savage 1988). So-called high-velocity clouds were discovered high above the plane of the Galaxy, and in other nearby spiral galaxies. X-ray observations showed the presence of vast quantities of hot gas in rich clusters of galaxies (Sarazin 1986), as well as in smaller compact groups (Saracco & Ciliegi 1995; Mulchaey et al. 1996). Cooling flows phenomena were observed in cluster members (Fabian 1994), as well as in individual elliptical galaxies (Nulsen, Stewart, & Fabian 1984). The extraplanar optical recombination emission was discovered at large galactocentric distances in several nearby galaxies (Donahue, Aldering, & Stocke 1995; Pildis, Bregman, & Schombert 1994). The depletion of globular cluster gas was interpreted as the consequence of ram-pressure stripping, and consequences were drawn thereof (Frank & Gisler 1976; Ninković 1985). Especially important motivation comes from the QSO absorption line studies. It is now clear that, at least at low redshift, a bulk of both metal and Ly$\alpha$ absorption lines arise in gas which is associated with luminous galaxies (Sargent, Steidel, & Boksenberg 1988; Bechtold & Ellingson 1992; Lanzetta et al. 1995; Bowen, Blades, & Pettini 1996; Chen et al. 1998). The idea that the QSO absorbers might arise in halos of normal galaxies originated with Bahcall & Spitzer (1969), but the quantitative models were rare (e.g. Bregman 1981) until recently, when vast accumulated data on absorber statistics enabled establishing strong empirical constraints on model parameters (see discussion in Mo & Morris 1994). Very important simple two-phase model of the galactic gaseous halos was put forward recently by Mo (1994), and Mo & Miralda-Escudé (1996; hereafter MM96). Their work shows quite persuasively that formation of the halo structure as a natural consequence of the galaxy formation and subsequent evolutionary processess. Formation of galaxies implies the collapse of the baryonic content of intergalactic space and its motion through the non-dissipative dark matter halos creating deep gravitational potential well. A halo of hot gas at virial temperature ($T_v \equiv \mu V_{\rm cir}^2/2k$, where $\mu$ is the average mass per particle, $k$ is the Boltzmann constant and $V_{\rm cir}$ is the circular velocity, which is assumed to parametrize the total mass of the galaxy) will form as the kinetic energy of the infalling material is thermalized in shocks of this primordial accretion. As the gas collapses, it is shocked and it subsequently cools (for an early treatment, see White & Rees 1978). Afterwards, similar situation (although presumably on smaller scale) arises in course of major galaxy mergers: here we also have a large mass of gas accreted into the system on a short timescale and substantial reheating. In the meantime, accretion of ambiental IGM is small or entirely negligible. When hot gas cools, it forms the [ *cold phase*]{}: photoionized clouds at $T_{\rm cold} \sim 10^4$ K, in pressure equilibrium with the hot halo, slowly sinking in the galactic gravitational potential. While cold phase may dominate the total gas mass, its filling factor is always small, and we shall not deal with it here separately. The galactocentric radius $r_c$ where the cooling time of the hot gas is the [*cooling radius*]{}. Quantitatively, it is necessary to satisfy $$\label{minone} \frac{5\mu k T_v}{2 \Lambda(T_v) \rho(r_c)} = t_M,$$ where $\Lambda(T_v)$ is the cooling rate at the virial temperature, and $\rho(r_c)$ is the physical density of hot gas at the cooling radius. Inside it, the conditions of adiabaticity and hydrostatic equilibrium, lead to the equation of state $P \propto \rho^{5/3}$, where $\rho$ is the density of the gas. The ratio of the total gas mass and the virial mass is set by the dimensionless parameter $f_g$. Isothermal potential of the dark matter creates the density profile $$\label{zero} \rho \propto \left( 1- K \ln \frac{r}{r_c} \right)^{\frac{3}{2}},$$ where $K$ is the constant, in the simplest model equal to 0.8. Simple calculation shows that pressure at some distance $r$ will behave as $P/k \propto (1-K \ln \frac{r}{r_c} )^{5/2}$. We see that one of the model parameters is $t_M$, the average interval between reheating of the gas, the inverse of what we may call the reheating frequency. It is one of the most uncertain parameters. MM96 use $$\label{one} t_M =\frac{t}{1+\Omega_0}$$ approximation, where $t$ is the age of the universe, and $\Omega_0$ is the total cosmological density parameter. It is used quite successfully by MM96, although admitting that a detailed treatment is difficult (due not only to the uncertainty in $\Omega_0$, but the power spectrum and physics of structure formation as well). While not questioning the goodness of this approximation, we would like to show that actual physical quantities resulting from their model are not much affected by the choice of $t_M$. One of, from the physical point of view, most important predictions is the value of the thermal pressure of the hot halo at small galactocentric distances, where interface with the ISM occurs. Therefore, in this paper, we are investigating the changes in the pressure at this inner boundary of the hot halo, when the average time-scale for reheating of the gas is varied. This is a part of the more comprehensive study of the boundary conditions of the two-phase model, which is currently in progress (Ćirković 1998). THERMAL PRESSURE AT THE HOT HALO BOUNDARIES =========================================== Formally, thermal pressure in the adiabatic model diverges as $r\rightarrow 0$. Of course, we know, from both theoretical modelling, and observations of Galactic ISM, that the real picture is more complicated. It seems clear that assumption of (quasi) hydrostatic equilibrium must be abandoned at some fiducial galactocentric radius, comparable to the size of disk in a spiral galaxy. This is not necessarily exact ISM-halo interface, since a lot of non-equilibrium and still poorly-understood phenomena (“galactic fountain”, winds, superbubbles, etc.) will conceivably have the desired effect of “softening” the global pressure profile at $R {\:^{<}_{\sim}\:}50$ kpc. We shall neglect these dynamical effects, and following Mo (1994) regard rough size of the disk, $R_d =20$ kpc as the inner boundary of the hot halo gas. This is justified on a qualitative basis, among other arguments, by the fact that no significant large-scale pressure gradients in the ISM of Milky Way were not observed, including observations toward high-latitude stars at galactocentric distance representing significant fraction of our chosen $R_d$. It is natural to expect that approximately uniform—when averaged over individual clouds and intercloud medium—ISM pressure is in equilibrium with the thermal pressure of the envelopping halo gas for any reasonable choice of parameters (Spitzer 1978). Therefore, we have calculated pressure $P/k$ at $R_d$ (for $z=0$, i.e. at the present epoch), as a function of $T_M$, a mean interval between reheating in major mergers. As is clear from the results obtained (see Figs. 1 and 2), the model is quite robust to the variations in $t_M$. For the case of a realistic Population II metallicity ($Z=0.1 \; Z_\odot$) shown in Fig. 1, changing $t_M$ by more than an order of magnitude in the case of $L_\ast$ galaxy results in change of $P/k$ by a factor of $\sim 2.5$. Even if the metallicities are higher (MM96), the same tendency persists, as is shown in the plot in Fig. 2 (for the global gas metallicity equal to the standard solar, which is unrealistically high). For comparison, the pressure in the local ISM was estimated by Spitzer (1978) as $P/k_{\rm B} = 1700$ K cm$^{-3}$ ($\log P/k = 3.2$), or at large sample of measured clouds (Jenkins, Jura, & Loewenstein 1983) $$\label{ism} 3.4 \leq \log P/k_{\rm B} \leq 3.8.$$ We note that, especially for higher values of $t_M$ (favored also by the equation (\[one\]) and other data; see, for example, Keel & Wu 1995) theoretical values of the two-phase model are quite consistent with this empirical range. Other theoretical uncertainties, like that in a fraction of the virial mass contained in gas (parameter $f_g$ in MM96), seem to be much greater than the one considered here. DISCUSSION ========== Major weaknesses of the theoretical framework this simple, manifest themselves clearly in the fact that mergers are considered only in terms of reheating through arising shocks, neglecting the mass input which undoubtedly occurs. On the other hand, without a detailed understanding of the underlying physics of merging events, it is difficult to proceed in that direction. It is clear, though, that if the bulk of the mass deposition occurs at small enough distances (compared to the virial radius before the merger), hot gas will be just a transient phase before most of the mass goes into cold, photoionized clouds. This can be estimated as follows: if $t_M$ is large compared to the timescale given by $\tau=5 \mu k T_0/2 \Lambda(T_0) \rho(r_0)$ (where $T_0=T_v(1-K \ln \frac{r_0}{r_c})$ and $\rho(r_0)$ is given by the equation (\[zero\]), with $r_0$ being the characteristic radius for mass deposition), a quasi-stationary state is reached, and the discussion we have followed applies. We have so far discussed only rehetaing in major mergers, which undoubtedly occurs from empirical evidence (Keel & Wu 1995, and references therein). Other conceivable reheating mechanisms (starbursts or switching on of a nuclear source) may be important in the inner part of the halo and should be considered in the course of a future work. We have shown that simple model based on assumptions of adiabaticity and quasi hydrostatic equilibrium gives physically acceptable results for the pressure at the ISM-halo interface, results which are quite insensitive to the assumptions about reheating frequency $1/t_M$. Until our theoretical knowledge on merger frequencies (or other reheating mechanisms) improves, we are justified in using simple approximations like (\[one\]). The author is happy to acknowledge help of Dr. Hou Jun Mo, who kindly provided a cooling code, as well as useful discussion, and Mr. Branislav Nikolić whose hospitality and support were essential for completion of this work. Dr Luka Č. Popović was, as usual, extremely helpful with a friendly advice and technical assistance. Bahcall, J. N., & Spitzer, L. Jr. 1969, ApJ, 156, L63 Bechtold, J. & Ellingson, E. 1992, ApJ, 396, 20 Bowen, D. V., Blades, J. C., & Pettini, M. 1996, ApJ, 464, 141 Bregman, J. N. 1981, ApJ, 250, 7 Chen, H.-W., Lanzetta, K. M., Webb, J. K., & Barcons, X. 1998, ApJ, in press Ćirković, M. M. 1998, in preparation Donahue, M., Aldering, G., & Stocke, J. T. 1995, ApJ, 450, L45 Fabian, A. C. 1994, ARAA, 32, 277 Frank, J., & Gisler, G. 1976, MNRAS, 176, 533 Jenkins, E. B., Jura, M., & Loewenstein, M. 1983, ApJ, 270, 88 Keel, W. C., & Wu, W. 1995, AJ, 110, 129 Mo, H. J. 1994, MNRAS, 269, L49 Mo, H. J., & Morris, S. L. 1994, MNRAS, 269, 52 Mo, H. J., & Miralda-Escudé, J. 1996, ApJ, 469, 589 (MM96) Mulchaey J. S., Davis, D. S., Mushotzky, R. F., & Burstein, D. 1996, ApJ, 456, 80 Ninković, S. 1985, Ap & SS, 110, 379 Nulsen, P. E. J., Stewart, G. C., & Fabian, A. C. 1984, MNRAS, 208, 185 Pildis, R. A., Bregman, J. N., & Schombert, J. M. 1994, ApJ, 423, 190 Saracco, P., & Ciliegi, P. 1995, A & A, 301, 348 Sargent, W. L. W., Steidel, C. C., & Boksenberg, A. 1988, ApJ, 334, 22 Savage, B. D. 1988, in QSO Absorption Lines: Probing the Universe, eds. Blades, J. C. et al. (Cambridge University Press, Cambridge) Spitzer, L. Jr. 1956, ApJ, 124, 20 Spitzer, L. Jr. 1978, “Physical Processes in the Interstellar Medium” (John Wiley & Sons, New York) White, S. D. M., & Rees, M. J. 1978, MNRAS, 183, 341 Fig. 1. [Thermal pressure of the hot halo at galactocentric distance $R_d=20$ kpc at present epoch for $f_g=0.05$ and several characteristic values of circular velocities of a galaxy, as a function of average interval between rehetaing $t_M$. Global halo metallicity is set to $Z=0.1 \; Z_\odot$. Long-dashed line corresponds to a very massive galaxy ($V_{\rm cir}=300$ km s$^{-1}$), and shord-dashed line to low-mass galaxy ($V_{\rm cir}=100$ km s$^{-1}$). The case of a typical $L_\ast$ galactic halo is shown as the solid line ($V_{\rm cir} \approx 220$ km s$^{-1}$). We note that $P/k$ stays approximately the same with reheating frequency taking all physically realistic values.]{} Fig. 2. [The same as in Fig. 1, except for the (unrealistic) case of halo gas having global metallicity equal to standard $Z_\odot$. Average values for the pressure are slightly lower due to more efficient cooling and consequent depletion of the hot phase.]{} [^1]: The term “halo” will be preferred over such frequently used terms as “corona” or “envelope”, although it is implied that they all describe the same physical objects.
{ "pile_set_name": "ArXiv" }
Q: Python subprocess Messy output With the following code: output = subprocess.check_output(['wmic', 'PATH', 'Win32_videocontroller', 'GET', 'description']) print(output , "\n") I get the next output: b'Description \r\r\nNVIDIA GeForce 710M \r\r\nIntel(R) HD Graphics 4000 \r\r\n\r\r\n' When I use the commando wmic path win32_videocontroller get desriptionin my CMD I get only the videocard info back. Is this possible in python aswell? With out the /r/r/r/r things? A: Use the argument "universal_newlines=True" when you call the function: output = subprocess.check_output(['wmic', 'PATH', 'Win32_videocontroller', 'GET', 'description'], universal_newlines=True) print(output , "\n")
{ "pile_set_name": "StackExchange" }
Eden Addresses U.S. Senate; Stresses Danger of Arab-israel Situation British Prime Minister Sir Anthony Eden, in an address before the United States Senate today, stressed the importance of a joint Anglo-American policy on the Arab-Israel problem. He made no reference to the Arab-Israel question when he spoke later in the House of Representatives. In the Senate, the British Prime Minister said: “In the area where the danger of conflict is most acute, we should whenever we can declare our unity of purpose. For instance, between the Arab states and Israel where the danger has increased, we have done well to make clear that we are to discuss together what action we should take. The more prepared we are the less likely is an emergency to arise.” A group of Arab diplomats, led by the Lebanese Ambassador, today called on George V. Allen, Assistant Secretary of State for Near Eastern Affairs, to complain that they were not consulted on the matters covered in the statement issued at the close of the Eden-Eisenhower talks yesterday. Speaking for himself and other Arab diplomats, Lebanese Ambassador Victor Khoury expressed the belief that any policy adopted toward the Middle East without Arab agreement cannot constitute “a factor of stability.” He said that he spoke to Mr. Allen on behalf of all Arab League members, including Iraq. The Archive of the Jewish Telegraphic Agency includes articles published from 1923 to 2008. Archive stories reflect the journalistic standards and practices of the time they were published.
{ "pile_set_name": "Pile-CC" }
The α₂ adrenergic antagonist fipamezole improves quality of levodopa action in Parkinsonian primates. Reduction in the antiparkinsonian benefit of levodopa is a major complication of long-term levodopa treatment in advanced Parkinson's disease (PD). Such loss of benefit arises because of reduced duration of action and appearance of disabling dyskinesia. We assess the potential of the α(2) adrenergic antagonist fipamezole to reduce motor complications in parkinsonian macaques. MPTP-lesioned macaques were treated acutely with fipamezole (10 mg/kg) alone and in combination with two doses of levodopa. Fipamezole extended both duration and quality of antiparkinsonian action of levodopa. Duration of antiparkinsonian action, on time, was increased by up to 75% while "good-quality" on time, i.e., that not associated with disabling dyskinesia, was increased by up to 98%. Combination of fipamezole with the lower dose of levodopa provided antiparkinsonian benefit at least equivalent to that provided by the higher dose levodopa alone. However, with the combination, antiparkinsonian benefit was of much better quality. The proportion of on time without disabling dyskinesia (79%) was significantly greater than that with high dose levodopa alone (45%). Increased duration and quality of levodopa action may represent therapeutically valuable actions of α(2) adrenergic antagonists.
{ "pile_set_name": "PubMed Abstracts" }
Dear JUAN R HERNANDEZ, Thank you for your order. We are currently reviewing for completeness and accuracy. A separate email with your Dell Order number(s) will be sent to you after the order is processed. A recap of your order is provided at the end of this message for your reference. We encourage you to verify, print, and retain the information on this page for your records. Date Submitted: 2/1/01 11:27:01 AM If at any time you have questions regarding your order please contact your Dell Sales Representative: Name: Employee Purchase Program Email: enterprise_online@dell.com Phone: 695-8133 ext 28907 Again, thank you for your order. We appreciate you buying from Dell and using your Dell Premier Pages Service. Sincerely, Dell Premier Pages Service Shopping cart includes 1 unique item(s) Total Price: $169.00 Item Detail#:1 Dimension L Series (Required)--Dimension&#174; L866r, Pentium&#174; III Processor at 866 MHz Memory: 128MB SDRAM Keyboard: QuietKey&#174; Keyboard Monitor: 17" (16.0 viewable, .28dp) E770 Monitor Video Card: Intel 3D AGP Graphics Hard Drive: 20GB Ultra ATA Hard Drive (7200 RPM) Floppy Drive: 1.44MB Floppy Drive Operating System: NEW Microsoft&#174; Windows&#174; 2000 Professional Mouse: Logitech First Mouse+ Wheel (PS/2v) Network Card: Integrated Intel&#17410/100 Ethernet Controller Modem: V.90/56K PCI DataFax Modem for Windows CD/DVD ROM Drive: NEW 8X/4X/32X CD-RW Drive Sound Card: Soundblaster 64V Integrated Speakers: harman/kardon Speakers Bundled Software: Microsoft&#174; Office 2000 Small Business Norton Antivirus&#174 at no additional charge: Norton Antivirus&#174; 2001 Hardware Support Services: 3Yrs Parts & Labor (Next Business Day) Software and Peripherals: Program Management Services Single Item Cost: $169.00 Quantity: 1 Sub-Total for Item: $169.00 ___________________ ** END OF ORDER **
{ "pile_set_name": "Enron Emails" }
org.apache.commons.math3.distribution.HypergeometricDistribution
{ "pile_set_name": "Github" }
--- author: - 'C. Lataniotis, S. Marelli, B. Sudret' bibliography: - 'Lataniotis-etal-Arxiv-2018.bib' title: 'Extending classical surrogate modelling to ultrahigh dimensional problems through supervised dimensionality reduction: a data-driven approach' --- Introduction {#sec:Introduction} ============ It is nowadays a common practice to study the behaviour of physical and engineering systems through computer simulation. In a real-world setting, such systems are driven by input parameters, the values of which can be uncertain or even unknown. Uncertainty quantification (UQ) aims at identifying and quantifying the sources of uncertainty in the input parameters to assess the uncertainty they cause in the model predictions. In the context of Monte Carlo simulation, such workflow typically entails the repeated evaluation of the computational model. However, it may become intractable when a single simulation is computationally demanding, as is often the case with modern computer codes. A remedy to this problem is to substitute the model with a surrogate that accurately mimics the model response within the chosen parameter bounds, but is computationally inexpensive. An additional benefit of surrogate models is that they are often non-intrusive, i.e. their construction only depends on a training set of model evaluations, without access to the model itself. This includes the case when the model is not available, but only a pre-existent data set is, as is typical in machine learning applications. The latter setting is the focus of this paper. Popular surrogate modelling techniques (SM) include Gaussian process modelling and regression [@Sacks1989; @Rasmussen2006], polynomial chaos expansions [@Ghanembook1991; @Xiu2002; @XiuBook2010], low-rank tensor approximations [@Chevreuil2015; @KonakliJCP2016], and support vector regression [@Vapnik1995]. Parametrising and training a surrogate model, however, can become harder or even intractable as the number of input parameters increases, a well known problem often referred to as *curse of dimensionality* (see @Verleysen05). For the sake of clarity, in the following we will classify high-dimensional inputs in two broad categories, depending on their characteristics: *unstructured* or *structured*. Unstructured inputs are characterised by the lack of an intrinsic ordering, and they are commonly identified with the so-called “model parameters”, point loads on mechanical models, or resistance values in electrical circuit models. Structured inputs, on the other hand, are characterised by the existence of a natural ordering and/or a distance function (*i.e.* they show strong correlation across some physically meaningful set of coordinates), as it is typical for time-series or space-variant quantities represented by maps. Boundary conditions in complex simulations that rely on discretisation grids, *e.g.* time-dependent excitations at grid nodes, often belong to this second class. In most practical applications, unstructured inputs range in dimension in the order $\co(10^{0-2})$, while structured inputs tend to be in the order $\co(10^{2-6})$. Several strategies have been explored in the literature to deal with high dimensional problems for surrogate modelling. A common approach in dealing with unstructured inputs is input variable selection, which consists in identifying the “most important” inputs according to some importance measure, see *e.g.* @Saltelli2008 [@Iooss2015], and simply ignoring the others (*e.g.* by setting them to their nominal value). In the context of kernel-based emulators (*e.g.* Gaussian process modelling or support vector machines), some attention has been devoted to the use of simple isotropic kernels [@djolonga2013], or to the design of specific kernels for high-dimensional input vectors, sometimes including deep-learning techniques (*e.g.*, [@Lawrence2005; @durrande2012; @wilson2016]). In more complex scenarios, the more general concept of *dimensionality reduction* (DR) is applied, which essentially consists in mapping the input space to a suitable lower dimensional space using an appropriate transformation prior to the surrogate modelling stage. The latter approach is considered in this work due to its applicability to cases for which variable selection seems inadequate or insufficient ( in the presence of structured inputs). In the current literature, a two-step approach is often followed for dealing with such problems: first, the input dimension is reduced; then, the surrogate model is constructed directly in the reduced (feature-) space. The dimensionality reduction step is based on an *unsupervised* objective, an objective that only takes into account the input observations. Examples of unsupervised objectives include the minimisation of the input reconstruction error [@vincent2008], maximisation of the sample variance [@Pearson01], maximisation of statistical independence [@hyvarinen1997one], and preservation of the distances between the observations [@tenenbaum2000isomap; @roweis2000nonlinear; @hinton2003sne]. While in principle attractive due to their straightforward implementation, unsupervised approaches for dimensionality reduction may be suboptimal in this context, because the input-output map of the reduced representation may exhibit a complex topology unsuitable for surrogate modelling [@wahlstrom2015; @calandra2016]. To deal with this issue, various *supervised* techniques have been proposed, in the sense that the objective of the input compression takes into account the model outputs. One such approach that has received attention recently is based on the so-called *active subspaces* concept [@Constantine2014]. Various methods that belong to this category, provide a linear transformation of the high dimensional input space into a reduced space that is characterised by maximal variability w.r.t. the model output. However, active subspace methods often require the availability of the model gradient w.r.t. the input parameters, a limiting factor in data-driven scenarios where such information is not available and needs to be approximated [@Fornasier2012]. Moreover, the numerical computation of the gradient may be infeasible in problems that involve structured inputs such as time series or 2D maps with $\co(10^{2-6})$ components. Other data-driven supervised DR techniques have been proposed in the literature, that are dependent on the properties of a specific combination of either DR or SM techniques. @HintonSalakhutdinov2006b employ multi-layer neural networks for both the DR and the SM steps. Specifically, an unsupervised objective based on the reconstruction error is followed by a generalisation performance objective that aims at fine tuning the network weights with respect to a measure of the surrogate modelling error. Similar approaches have been proposed with other combinations of methods. In @damianou2013deep, the same idea is extended by using stacked Gaussian processes instead of multilayer neural networks. In @huang2015 [@calandra2016] this approach is extended by combining neural networks with Gaussian processes within a Bayesian framework. All of these methods demonstrate that supervised methods yield a significant accuracy advantage over the unsupervised ones, as the final goal of the supervised learner (*i.e.* surrogate model accuracy) matches the final goal of high-dimensional surrogate modelling in the first place. However, this increased accuracy comes at the cost of restricting the applicability of such methods to specific combinations of DR and SM techniques. In this paper, we propose a novel method of performing dimensionality reduction for surrogate modelling in a data-driven setting, which we name (perhaps with a lack of creative flair) DRSM. The aim of this method is to capitalise on the performance gains of supervised DR, while maintaining maximum flexibility in terms of both DR and SM methodologies. Recognising that different communities, applications and researchers have in general access to one or two preferred techniques for either DR or SM, the proposed approach is fully non-intrusive, *i.e.* both the DR and the SM stages are considered as *black boxes* under very general conditions. The novelty lies in the way the two stages are coupled into a single problem, for which dedicated solvers are proposed. This paper is structured as follows: Section 2 introduces the main ingredients required by DRSM, namely dimensionality reduction and surrogate modelling. For the sake of clarity, some of the techniques that will be specifically used in the applications section are also introduced, *i.e.* kernel principal component analysis (KPCA) for DR, Gaussian process modelling, a.k.a. Kriging, and polynomial chaos expansions (PCE) for SM. The core framework underlying DRSM is then introduced. Finally, the effectiveness of DRSM is analysed on several benchmark applications including both unstructured and structured inputs, ranging from low-dimensional analytical functions to a complex engineering 2-dimensional heat-transfer problem. Ingredients for surrogate modelling in high dimension {#sec:Methodology} ===================================================== As the name implies, DRSM consists in the combination of two families of computational tools: dimensionality reduction and surrogate modelling. This section aims at highlighting the main features of each, and how they can be exploited without resorting to intrusive, dedicated algorithms. Dimensionality reduction {#sec:Meth:DR} ------------------------ Consider a set of high-dimensional samples $\cx = \acc{\bfx^{(i)}\in \Rr^M\, , \, i=1\enu N}$. In an abstract sense, dimensionality reduction (DR) refers to the parametric mapping $g: \cx \in \Rr^M \mapsto \cz \in \Rr^m$ of the form: $$\label{eq:DR_general_form} \bfz = g(\bfx ; \bfw)$$ where $\bfz \in \cz$, $\bfx \in \cx$, and $\bfw$ is the set of parameters associated with the mapping. Dimensionality reduction occurs if $m\ll M$, if $m=\co\prt{10^{0-1}}$ whereas $M=\co\prt{10^{2-4}}$. The nature and number of the parameters $\bfw$ depends on the specific DR method under consideration. Such transformations are motivated by the assumption that the samples in $\cx$ lie on some manifold with dimensionality $m$ that is embedded within the $M$-dimensional space. This specific value of $m$ is in some applications referred to as the “intrinsic dimension” of $\cx$ [@Fukunaga2013]. From an information theory perspective, the intrinsic dimension refers to the minimum number of scalars that is required to represent $\cx$ without any loss w.r.t. an appropriate information measure. In practice it is a-priory unknown. In such cases DR is an ill-posed problem that can only be solved by assuming certain properties of $\cx$, such as its intrinsic dimension. Alternatively the later may be approximated and/or inferred from the available data by various approaches (see @Camastra2003 for a comparative overview). An important aspect of all parametric DR methods, regardless of their specificity, is that for each choice of dimension $m$ the remaining parameters $\bfw$ are estimated by minimising a suitable error measure (sometimes referred to as loss function): $$\widehat{\bfw} = \arg \underset{\cd_\bfw}{\min} \, J(\bfw;\cx),$$ where $ \widehat{\bfw}$ denotes the estimated parameters, $\cd_\bfw$ the feasible domain of $\bfw$, $J(\cdot)$ the error measure and $\cx$ the available data. The choice of the error measure depends on the specific application DR is used for. When the goal is direct compression of a high dimensional input without information loss (a common situation in telecommunication-related applications), a typical choice of $J(\cdot)$ is the so-called mean-squared reconstruction error, that reads: $$J(\bfw;\cx) = \frac{1}{N} \sum_{i=1}^{N} {\left\lVert\bfx^{(i)} - \tilde{\bfx}^{(i)}\right\rVert}^2,$$ where $\tilde{\bfx}=g^{-1}(\bfz,\bfw)$ denotes the reconstruction of the sample $\bfx$, calculated through the inverse transform $g^{-1}: \cz \in \Rr^m \mapsto \cx \in \Rr^M$. In the general case, additional parameters may be introduced in $g^{-1}$, or the inverse transform may not exist at all (see @Kwok2003). For a detailed description of the specific DR methods used in this paper to showcase the proposed methodology, namely principal component analysis (PCA) and kernel PCA, the reader is referred to [Section \[sec:Meth:Selected DR and SM\]]{}. Surrogate Modelling {#sec:Meth:SM:Intro} ------------------- In the context of UQ, the physical or computational model of a system can be seen as a black-box that performs the mapping: $$\label{eq:true_model} \ve{Y} = \cm(\ve{X}),$$ where $\ve{X}$ is a random vector that parametrises the variability of the input parameters (*e.g.* through a joint probability density function) and $\ve{Y}$ is the corresponding random vector of model responses. One of the main applications of UQ is to propagate the uncertainties from $\ve{X}$ to $\ve{Y}$ through the model $\cm$. Direct methods based on Monte-Carlo simulation may require that the computational model is run several thousands of times for different realisations $\bfx$ of the input random vector $\ve{X}$. However, most models that are used in applied sciences and engineering (*e.g.* high-resolution finite element models) can have high computational costs per model run. As a consequence, they cannot be used directly. To alleviate the associated computational burden, surrogate models have become a staple tool in all types of uncertainty quantification applications. A surrogate model $\widehat{\cm}$ is a computationally inexpensive approximation of the true model of the form: $$\label{eq:surrogate} \cm(\ve{X}) = \widehat{\cm}(\ve{X}; \bm{\theta}) + \epsilon,$$ where $\bm{\theta}$ is a set of parameters that characterise the surrogate model and $\epsilon$ refers to an error term. The parameters $\bm{\theta}$ are inferred (typically through some form of optimisation process) from a limited set of runs of the original model ${\cx = \acc{\bfx^{(1)} \enu \bfx^{(N)}}}$, called the *experimental design*. As an example, $\bfth$ denotes the set of coefficients in the case of a truncated polynomial chaos expansion, or the set of parameters of both the trend and the covariance kernel in case of Gaussian process modelling. Throughout the rest of the paper, the output of the model $\cm$ is considered scalar, $y = \cm(\bfx) \in \Rr$. Arguably the most well-known accuracy measure for most surrogates is the relative generalisation error $\varepsilon_{gen}$ that reads: $$\label{eq:epsilong_gen_ideal} \varepsilon_{gen} = \Esp{\prt{Y - \widehat{\cm}(\ve{X};\bm{\theta})}^2}/\Var{Y}.$$ This error measure (or, more precisely, one of its estimators) is also the ideal objective function for the optimisation process involved in the calibration of the surrogate parameters $\bm{\theta}$. In practical situations, however, it is not possible to calculate $\varepsilon_{gen}$ analytically. An estimator $\widehat{\varepsilon}_{gen}$ of this error can be computed by comparing the true and surrogate model responses evaluated at a sufficiently large *validation set* $\cx_v = \acc{\bfx^{(1)} \enu \bfx^{(N_v)} }$ of size $N_v$: $$\label{eq:epsilong_gen_estim} \widehat{\varepsilon}_{gen} = \frac{\sum_{i=1}^{N_v} \prt{ \cm(\bfx^{(i)}) - \widehat{\cm}(\bfx^{(i)}) }^2} {\sum_{i=1}^{N_v} \prt{\cm(\bfx^{(i)}) - \widehat{\mu}_y}^2},$$ where $\widehat{\mu}_y=\frac{1}{N} \sum_{i=1}^{N_v} \cm(\bfx^{(i)})$ is the sample mean of the validation set responses and $\widehat{\cm}(\bfx^{(i)})$ is used in place of $\widehat{\cm}(\bfx^{(i)};\bm{\theta})$ to simplify the notation. In data-driven applications, or when the computational model is expensive to evaluate, only a single set $\cs \overset{\text{def}}{=} \acc{\cx, \bfy}$ is available. The entire set is therefore used for calculating the surrogate parameters. Estimating the generalisation error by means of [Eq. (\[eq:epsilong\_gen\_estim\])]{} on the same set, however, corresponds to computing the so-called *empirical error*, which is prone to underestimate drastically the true generalisation error, due to the overfitting phenomenon. In such cases, a fair approximation of $\widehat{\varepsilon}_{gen}$ can be obtained by means of cross-validation (CV) techniques (see @Hastie2001). In $k$-fold CV, $\cs$ is randomly partitioned into $k$ mutually exclusive and collectively exhaustive sets $\cs_i$ of approximately equal size: $$\label{eq:CV_sets} \cs_i \cap \cs_j = \emptyset ~, ~ \forall (i,j) \in \lbrace 1,\ldots,k \rbrace ^2 ~ \text{ and } \bigcup_{i=1}^{k} \cs_i = \cs .$$ The $k$-fold cross-validation error $\varepsilon_{CV}$ reads: $$\label{eq:epsilon_cv} \varepsilon_{CV} = \frac{\sum_{i=1}^{k} \sum_{\bfx \in \cs_i}\prt{ \cm(\bfx) - \widehat{\cm}^{\cs\setminus\cs_i}( \bfx) }^2} {\sum_{\bfx \in \cs} \prt{\cm(\bfx) - \widehat{\mu}_y}^2},$$ where $\widehat{\cm}^{S}_{\cs \setminus \cs_i}$ denotes the surrogate model that is calculated using $\cs$ excluding $\cs_i$. The bias of the generalisation error estimator is expected to be minimal in the extreme case of *leave-one-out (LOO) cross-validation* [@Arlot2010], which corresponds to $N-$fold cross validation. The LOO error $\varepsilon_{LOO}$ is calculated as in [Eq. (\[eq:epsilon\_cv\])]{} after substituting the set $S_i$ by the singleton $\acc{\bfx^{(i)}}$ ( $k=N$): $$\label{eq:epsilon_LOO} \varepsilon_{LOO} = \frac{\sum_{i=1}^{N} \prt{ \cm(\bfx^{(i)}) - \widehat{\cm}^{\backslash i}( \bfx^{(i)}) }^2} {\sum_{i=1}^{N} \prt{\cm(\bfx^{(i)}) - \widehat{\mu}_y}^2},$$ where the term $\cm^{\backslash i}( \bfx^{(i)})$, denotes the surrogate built from the set $S \backslash \acc{\bfx^{(i)}}$, evaluated at $\bfx^{(i)}$. The calculation of $\varepsilon_{LOO}$ can be computationally expensive, because it requires the evaluation of $N$ surrogates, but it does not require any additional run of the full computational model. For Gaussian process modelling and polynomial chaos expansions, computational shortcuts are available to alleviate such costs (*e.g.* @Dubrule1983 [@BlatmanJCP2011]), in the sense that $\varepsilon_{LOO}$ in [Eq. (\[eq:epsilon\_LOO\])]{} is evaluated from a single surrogate model $\widehat{\cm}$ calculated from the full data set $\cs$. As a final step in the surrogate modelling procedure, the set of parameters $\bm{\theta}$ of the surrogate model are optimised *w.r.t.* to one of the generalisation error measures in [Eq. (\[eq:epsilon\_cv\])]{} or [Eq. (\[eq:epsilon\_LOO\])]{} directly, based on the available samples in $\cs$, : $$\label{eq:theta_optim_general} \widehat{\bfth{}} = \arg \underset{\cd_{\bfth}}{\min}\, \widehat{\epsilon}_{gen}(\bfth; \cs),$$ where $\widehat{\bfth{}} $ denotes the optimal set of parameters, $\cd_{\bfth}$ the feasible domain of parameters and $\widehat{\epsilon}_{gen}$ refers to the chosen estimator of $\epsilon_{gen}$. An important aspect of this optimisation step for many types of recent surrogates is that the number of parameters $\bm{\theta}$ scales with the number of input variables. Therefore, surrogates tend to suffer from the curse of dimensionality in two distinct ways: higher dimensional optimisation and underdetermination. Higher dimensional optimisation is linked to a complex objective-function topology, and is therefore prone to convergence to low-performing local minima. In general it requires global optimisation algorithms, such as genetic algorithms, covariance matrix adaptation, or differential evolution [@Goldberg1989; @Hansen2003; @Yang2007]. Underdetermination leads the solutions to the minimisation problem to be non-unique due to the lack of constraining data. In other words, surrogate models with more parameters require in general a larger experimental design or sparse minimisation techniques to avoid overfitting. The proposed DRSM approach {#sec:Meth:DRSM} ========================== Introduction {#sec:Meth:DRSM:intro} ------------ Consider now the experimental design $\cs = \acc{\cx, \bfy}$ introduced above, and assume that it is the only available information about the problem under investigation. Moreover, the dimensionality of the input space is high, $\bfx^{(i)} \in \Rr^M\, ,\, i=1\enu N$ where $M$ is large, say $\co\prt{10^{2-4}}$. The goal is to calculate a surrogate model that serves as an approximation of the real model solely based on the available samples. This is a key ingredient for subsequent analyses in the context of uncertainty quantification. To distinguish between various computational schemes, we denote from now on by $\widehat{\cm}|\cx,\bfy$ a surrogate model whose parameters $\bfth$ are calculated from the experimental design $\cx$ and associated model response $\bfy$. Due to the high input dimensionality, a surrogate $\widehat{\cm}|\cx,\bfy$ may lead to poor generalisation performance or it may not even be computationally tractable. To reduce the dimensionality, the class of DR methods was introduced in [Section \[sec:Meth:DR\]]{}. A DR transformation, expressed by $\cz = g(\cx; \bfw)$, can provide a compressed experimental design, $\bfz^{(i)} \in \Rr^m\, ,\, i=1\enu N$ with $m\ll M$. The surrogate $\widehat{\cm}|\cz,\bfy$ becomes tractable if $m$ is sufficiently small. The potential of $\widehat{\cm}|\cz,\bfy$ to achieve satisfactory generalisation performance depends on (i) the learning capacity of the surrogate itself and (ii) the assumption that the input-output map $\bfx \mapsto y$ can be sufficiently well approximated by a smaller set of features via the transformation $g(\cdot)$. This discussion focuses on the latter and assumes that the learning capacity of the surrogate is adequate. In case of unstructured inputs, the importance of each input variable may vary depending on the output of interest. In case of structured inputs, there is typically high correlation between the input components. Hence, in both families of problems a low-dimensional representation may often approximate well the input-output map. Traditional DR approaches are focused on the discovery of the input manifold and not the input-output manifold. Performing an input compression without taking into account the associated output values may lead to a highly complex input-output map that is difficult to surrogate. In the DRSM (dimensionality reduction for surrogate modelling) approach proposed in this paper, we capitalise on this claim to try and find an optimal input compression scheme w.r.t. the generalisation performance of $\widehat{\cm}|\cz,\bfy$. A nested optimisation problem {#sec:Meth:DRSM:1_nested_optim} ----------------------------- The goal of DRSM is to optimise the parameters $\bfw$ of the compression scheme so that the auxiliary variables $\bfz = g(\bfx;\bfw)$ are suitable to achieve an overall accurate surrogate. The general formulation of this problem reads: $$\label{eq:DRSM_general} \acc{\bfwh,\bfthh} = \underset{\bfw \in \cd_{\bfw},\,\bfth \in \cd_{\bfth} }{\arg \min} \ell \prt{\cm(\cdot),\widehat{\cm} \prt{g(\cdot;\bfw), \bfth} },$$ where $\ell$ denotes the objective function (a.k.a. loss function) that quantifies the generalisation performance of the surrogate. In practice, if a validation set is available, $\ell$ corresponds to a generalisation error estimator like the one in [Eq. (\[eq:epsilong\_gen\_estim\])]{}. In the absence of a validation set, then either the LOO estimator in [Eq. (\[eq:epsilon\_LOO\])]{} or its $k$-fold CV counterpart in [Eq. (\[eq:epsilon\_cv\])]{} are used instead. In the following, it is assumed that a validation set is not available and the generalisation error is estimated by the LOO error, hence $\ell$ is substituted by the $\varepsilon_{LOO}$ expression in [Eq. (\[eq:epsilon\_LOO\])]{}. The proposed approach for solving [Eq. (\[eq:DRSM\_general\])]{}, is related to the concept of *block-coordinate descent* [@Bertsekas1999]. During optimisation, the parameters $\bfw$ and $\bfth$ are updated in an alternating fashion. One of the main reasons for this choice is that the optimisation steps of both DR and SM techniques are often tuned ad-hoc to optimise their performance. Examples include sparse linear regression for polynomial chaos expansions [@BlatmanJCP2011], or quadratic programming for support vector machines for regression [@Vapnik1995]. A single joint optimisation, albeit potentially yielding accurate results, would require the definition of complex constraints on the different sets of parameters $\bfw$ and $\bm{\theta}$. Therefore, the problem in [Eq. (\[eq:DRSM\_general\])]{} is expressed as a nested-optimisation problem. The outer loop optimisation reads: $$\label{eq:DRSM_outer_loop} \bfwh = \underset{\bfw \in \cd_{\bfw}}{\arg \min} ~ \varepsilon_{LOO}(\bfw; \bfthh(\bfw),\cx,\bfy),$$ where $\varepsilon_{LOO}$ denotes the LOO error ([Eq. (\[eq:epsilon\_LOO\])]{}) of the surrogate $\widehat{\cm}(\bfz;\bfw,\cx,\bfy)$ evaluated at $\acc{\cx,\bfy}$ and $\bfthh(\bfw)$ denotes the optimal parameters of $\widehat{\cm}$ for that particular $\bfw$ value. The term $\bfthh(\bfw)$ is calculated by solving the inner loop optimisation problem: $$\label{eq:DRSM_inner_loop} \bfthh = \underset{\bfth \in \cd_{\bfth} }{\arg \min} ~ \varepsilon_{LOO}(\bfth;\bfw, \cx,\bfy).$$ The nested optimisation approach to DRSM comes with costs and benefits. On the one hand, each objective function evaluation of the outer-loop optimisation becomes increasingly costly w.r.t. the number of samples in the experimental design and the complexity of the surrogate model. On the other hand, the search space in each optimisation step can be significantly smaller, compared to the joint approach, due to the reduced number of optimisation variables. Moreover, this nested optimisation approach enables DRSM to be entirely non-intrusive. Off-the-shelf well-known surrogate modelling methods can be used to solve [Eq. (\[eq:DRSM\_inner\_loop\])]{}. Proxy surrogate models for the inner optimisation {#sec:Meth:DRSM:proxy} ------------------------------------------------- Albeit non-intrusive and having a relatively low dimension, the inner optimisation in [Eq. (\[eq:DRSM\_inner\_loop\])]{} is in general the driving cost of DRSM. Indeed, calculating the parameters of a single high-resolution modern surrogate may require anywhere between a few seconds and several minutes. To reduce the related computational cost, it is often possible to solve *proxy surrogate* problems, *i.e.* using simplified surrogates that, while not being as accurate as their full counterparts, are easier to parametrise. A simple example would be to prematurely stop the optimisation in the inner loop in [Eq. (\[eq:DRSM\_inner\_loop\])]{}, or to use isotropic kernels for kernel-based surrogates such as Kriging or support vector machines instead of their more accurate, but costly to train, anisotropic counterparts. Once the outer loop optimisation completes on the proxy surrogate, thus identifying the quasi-optimal DR parameters $\bfwh$, a single high-accuracy surrogate is then computed on the compressed experimental design $\acc{\cz= g(\cx;\bfwh), \bfy}$. Further discussion on this topic can be found in Sections \[sec:Meth:SM:Kriging\] and \[sec:Meth:SM:PCE\]. Selected compression and surrogate modelling techniques used in this paper {#sec:Meth:Selected DR and SM} ========================================================================== Due to the non-intrusiveness in the design of the DRSM method proposed in [Section \[sec:Meth:DRSM\]]{}, no specific dimensionality reduction or surrogate modelling technique has been introduced yet. In the following section, two well-known dimensionality reduction (namely principal component analysis and kernel-principal component analysis) and two surrogate modelling techniques (Kriging and polynomial chaos expansions) are introduced to showcase the DRSM methodology on several example applications in [Section \[sec:Applications\]]{}. Only the main concept and notation is reminded so that the paper is self-consistent. Principal component analysis {#sec:Meth:DR:PCA} ---------------------------- Principal Component Analysis (PCA) is a dimensionality reduction technique that aims at calculating a linear basis of $\ve{X}$ with reduced dimensionality that preserves the sample variance [@Pearson01]. Given a sample of the input random vector $\cx = \acc{\bfx^{(1)},\dots,\bfx^{(N)}}$, the PCA algorithm is based on the eigen-decomposition of the sample covariance matrix $\ve{C}$: $$\label{eq:PCA_Covariance} \ve{C} = \frac{1}{N} \bar{\cx}^\top \bar{\cx},$$ of the form: $$\label{eq:PCA_eigendecomp} \ve{C} \ve{v}^{(i)} = \lambda^{(i)} \ve{v}^{(i)} \, , \, i=1 \enu M$$ where $\bar{\cx}$ denotes the centred (zero mean) experimental design, $\lambda^{(i)}$ denotes each eigenvalue of $\ve{C}$ and $\ve{v}^{(i)}$ the corresponding eigenvector. The dimensionality reduction transformation reads: $$\label{eq:PCA_fwtrans} \cz = \bar{\cx} \, \mat{V}$$ where $\mat{V}$ is the $M\times m$ collection of the $m$ eigenvectors of $\mat{C}$ with maximal eigenvalues. Those eigenvectors are called the *principal components* because they correspond to the reduced basis of $\cx$ with maximal variance. Based on the general DR perspective that was presented in [Section \[sec:Meth:DR\]]{}, PCA is a linear transformation of the form $\cz = g(\cx;w)$, where the only parameter to be selected is the dimension $m$ of the reduced space, $w=m$. Kernel principal component analysis {#sec:Meth:DR:KPCA} ----------------------------------- Kernel PCA (KPCA) is the reformulation of PCA in a high-dimensional space that is constructed using a kernel function [@Scholkopf1998_KPCA]. A kernel function applied on two elements $\bfx^{(i)}, \bfx^{(j)} \in \cd_{\bfx}$ has the following form: $$\label{eq:kappa_definition} \kappa\prt{\bfx^{(i)}, \bfx^{(j)}} = \Phi\prt{\bfx^{(i)}} \cdot \Phi\prt{\bfx^{(j)}}$$ where $\Phi(\cdot)$ is a function that performs the mapping $ \Phi: \cd_{\bfx} \rightarrow \ch $ and $\ch$ is known as the feature space. Based on [Eq. (\[eq:kappa\_definition\])]{}, the so-called *kernel trick* is applied, which refers to the observation that, if the access to $\ch$ only takes place through inner products, then there is no need to explicitly define $\Phi(\cdot)$. The result of the inner product can be directly calculated using $\kappa(\cdot,\cdot)$. Kernel PCA is a non-linear extension of PCA where the kernel trick is used to perform PCA in $\ch$. The principal components in $\ch$ are obtained from the eigen-decomposition of the sample covariance matrix $\bfC_\ch$, analogously to the PCA case in [Eq. (\[eq:PCA\_Covariance\])]{}. However, in KPCA the eigen-decomposition problem: $$\label{eq:KPCA_eigenprob} \bfC_\ch \ve{v}^{(i)} = \lambda_i \ve{v}^{(i)} \, , \, i = 1 \enu N$$ is intractable, since $\bfC_\ch$ cannot in general be computed ($\ch$ might even be infinitely dimensional). This problem is by-passed by observing that each eigenvector belongs to the span of the samples $\Phi\prt{\bfx^{(1)}}, \ldots, \Phi\prt{\bfx^{(N)}}$, therefore scalar coefficients $\alpha_k^{(i)}$ exist, such that each eigenvector $\ve{v}^{(i)}$ can be expressed as the following linear combination [@Scholkopf1998_KPCA]: $$\label{eq:KPCA_v} \ve{v}^{(i)} = \sum_{k=1}^N \alpha_k^{(i)} \Phi\prt{\bfx^{(k)}} \, , \, i = 1 \enu N .$$ Based on [Eq. (\[eq:KPCA\_v\])]{} it can be shown that the eigen-decomposition problem in [Eq. (\[eq:KPCA\_eigenprob\])]{} can be cast as: $$\label{eq:KPCA_alphas} \bfK \bfal^{(i)} = \lambda^{(i)} \bfal^{(i)} \, , \, i = 1 \enu N$$ where $\bfK$ is the kernel matrix with elements: $$K_{ij} = \kappa\prt{\bfx^{(i)}, \bfx^{(j)}}.$$ As for the case of PCA, $\cz$ is calculated by projecting $\cx$ on the $m$ principal axes $\acc{\ve{v}^{(i)}\, , \, \allowbreak i = 1 \enu m}$ corresponding to the $m$ largest eigenvalues. @Scholkopf1998_KPCA showed that $\cz$ can be directly computed based only on the values of the eigenvector expansion coefficients $\alpha_k^{(i)}$ and the kernel matrix $\mat{K}$. The $k$-th component of the $i$-th sample of $\cz$, denoted by $z_k^{(i)} $ is given by; $$\label{eq:KPCA_FWtrans} z_k^{(i)} = \Phi\prt{\bfx^{(i)}}^\mathsf{T} \ve{v}^{(k)} = \sum_{j=1}^N \alpha_k^{(j)} \kappa\prt{\bfx^{(i)}, \bfx^{(j)}}$$ The key ingredient of KPCA is arguably the kernel function $\kappa$. In this paper two kernels are considered, namely the *polynomial* kernel: $$\label{eq:KPCA_kernel_poly} \kappa(\bfx, \bfx'; \bfw) = \prt{ w_1 \bfx^\mathsf{T}\bfx' + w_2}^{w_3}\, , \, w_1>0, w_2 \geq 0, w_3 \in \Nn,$$ and the *Gaussian* kernel: $$\label{eq:KPCA_kernel_gauss_aniso} \kappa(\bfx, \bfx'; \bfw) = \exp \prt{ - \frac{1}{2}\sum_{k=1}^{M}\frac{1}{w_k^2} \prt{x_k- x_k' }^2} \, , \, w_k > 0 \, , \, k = 1 \enu M.$$ A special case of the Gaussian kernel is the *isotropic* Gaussian kernel (also known as *radial basis function*) that simply assumes the same parameter value $w_k$ for all components of $\bfx$. Note that KPCA using a polynomial kernel with parameters $w_1=1$, $w_2=0$ and $w_3=1$ is identical to PCA, since $\Phi(\bfx) = \bfx$. A discussion on the equivalence between PCA and KPCA with linear kernel ($w_3=1$) for arbitrary values of $w_1,w_2$ can be found in Appendix \[sec:Appendix:PCA\_vs\_linKPCA\]. From [Eq. (\[eq:KPCA\_FWtrans\])]{} it follows that $\cz$ can be expressed as $\cz = g(\cx; \bfw)$ where $\bfw$ encompasses both the kernel parameters and the reduced space dimension $m$. In the context of unsupervised learning, two methods to infer the values of $\bfw$ from $\cx$ are considered. The *distance preservation* method aims at optimising $\bfw$ in such a way that the Euclidean distances between the samples are preserved between the original and the feature space [@Weinberger2004]. This is expressed by the following objective function: $$\label{eq:KPCA_Jdist} J_{dist} (\bfw ; \cx) = \sum_{i,j=1}^{N} \prt{d_{ij} - \delta_{ij}}^2$$ where $$\label{eq:KPCA_Jdist_d} d_{ij} = {\left\lVert\bfx^{(i)} - \bfx^{(j)}\right\rVert}$$ and $$\label{eq:KPCA_Jdist_delta_1} \delta_{ij} = {\left\lVert\Phi(\bfx^{(i)},\bfw) - \Phi(\bfx^{(j)},\bfw) \right\rVert}.$$ By expanding the norm expression in [Eq. (\[eq:KPCA\_Jdist\_delta\_1\])]{} it is straightforward to show that: $$\label{eq:KPCA_Jdist_delta_2} \delta_{ij} = \sqrt{K_{ii} + K_{jj} - 2 K_{ij}},$$ hence the value of $\delta_{ij}$ is readily available from the kernel matrix $\mat{K}$. The *reconstruction error*-based method aims at optimising $\bfw$ in such a way that the so-called pre-image, $\tilde{\bfx} = g^{-1}(\bfz,\bfw')$, of $\bfz = g(\bfx, \bfw)$ approximates $\bfx$ as close as possible [@Alam2014]. This is expressed by the following objective function: $$\label{eq:KPCA_Jrecon} J_{recon} (\bfw ; \cx) = \frac{1}{N} \sum_{i=1}^{N} {\left\lVert\bfx^{(i)} - \tilde{\bfx}^{(i)}\right\rVert}^2$$ In contrast to PCA, calculating $\tilde{\bfx}$ is non-trivial, an issue that is known as the *pre-image problem* (see @Kwok2003). The approach for dealing with this problem is the one adopted by the popular <span style="font-variant:small-caps;">python</span> package <span style="font-variant:small-caps;">scikit-learn</span> [@Pedregosa2011], which is based on @Bakir2004. After performing the KPCA transform $\cx \mapsto \cz$, the (non-unique) pre-image of a new point $\bfz$ is computed by kernel-ridge regression using a new kernel function $\kappa_{pre}$: $$\label{eq:KPCA_preimage_main} \tilde{\bfx} = \bm{\beta}^\mathsf{T} \bm{l}(\bfz) ,$$ where: $$\label{eq:KPCA_preimage_l} \bs{\ell}(\bfz) =\acc{\kappa_{pre}(\bfz, \, \bfz^{(j)}), \; j=1 \enu N},$$ and $\bm{\beta}$ are the kernel-ridge regression coefficients. They are calculated as follows: $$\label{eq:KPCA_preimage_beta} \bm{\beta} = \prt{\bm{L} + r \bm{I}_N }^{-1} \cx \qquad L_{ij} = \acc{\kappa_{pre}\prt{\bfz^{(i)},\bfz^{(j)}},\; i,j=1\enu N}$$ where $r$ is a regularisation parameter and $\bm{I}_N$ is the $N$-dimensional identity matrix. In @Pedregosa2011 and in this paper, we use for simplicity the same kernel for the pre-image problem as for KPCA, $\kappa_{pre}\prt{\cdot, \cdot}$ is chosen equal to $\kappa \prt{\cdot, \cdot}$. Note that, in the unsupervised learning literature, the reduced space dimension, $m$, is typically not part of $\bfw$, only the kernel parameters are considered when minimising the objective function in [Eq. (\[eq:KPCA\_Jdist\])]{} or [Eq. (\[eq:KPCA\_Jrecon\])]{}. Kriging {#sec:Meth:SM:Kriging} ------- Kriging, a.k.a. Gaussian process modelling, is a surrogate modelling technique which assumes that the true model response is a realisation of a Gaussian process described by the following equation [@santner_design_2003]: $$\label{eq:KrigingGeneral} \widehat{\cm}(\bfx) = \ve{\beta}^\top \ve{f}(\ve{x}) + \sigma^2 Z(\bfx)$$ where $\ve{\beta}^\top \ve{f}(\ve{x})$ is the mean value of the Gaussian process, also called *trend*, $\sigma^2$ is the Gaussian process variance and $Z(\bfx)$ is a zero-mean, unit-variance Gaussian process. This process is fully characterised by the auto-correlation function between two sample points $R(\bfx,\bfx';\bfth)$. The hyperparameters $\bfth$ associated with the correlation function $R(\cdot;\bfth)$ are typically unknown and need to be estimated from the available observations. Various correlation functions can be found in the literature [@Rasmussen2006; @santner_design_2003], including the *linear*, *exponential*, *Gaussian* (a.k.a. *squared exponential*) and *Matérn* functions. In this paper the separable Matérn correlation family is chosen: $$\label{eq:Kriging_Matern_general} R\prt{\abs{\bfx - \bfx'}; \bm{l}, \nu} = \prod_{i=1}^{M} \frac{1}{2^{\nu -1} \Gamma(\nu)} \prt{\sqrt{2\nu} \frac{\abs{x_i - x'_i}}{l_i} }^\nu \kappa_\nu \prt{\sqrt{2\nu} \frac{\abs{x_i - x'_i}}{l_i}},$$ where $\bfx$, $\bfx'$ are two samples in the input space $\cd_x$, $\bm{l} = \acc{l_i>0,\, i=1 \enu M}$ are the scale parameters (also called *correlation lengths*), $\nu \geq 1/2$ is the shape parameter, $\Gamma(\cdot)$ is the Euler Gamma function and $\kappa_\nu(\cdot)$ is the modified Bessel function of the second kind (a.k.a. Bessel function of the third kind). The values $\nu=3/2$ and $\nu=5/2$ of the shape parameter are commonly used in the literature. The *isotropic* variant of the Matérn correlation family assumes a fixed correlation length value $l$ in [Eq. (\[eq:Kriging\_Matern\_general\])]{} over all $M$ input variables. Regarding the trend part $\ve{\beta}^\top \ve{f}(\ve{x})$ in [Eq. (\[eq:KrigingGeneral\])]{}, the general formulation of *universal Kriging* is adopted, which assumes that the trend is composed of a linear combination of $P$ pre-selected functions $\acc{f_i(\bfx),\, i=1 \enu P}$, : $$\label{eq:Kriging_trend} \ve{\beta}^\top \ve{f}(\ve{x}) = \sum_{i=1}^P \beta_i f_i(\bfx),$$ where $\beta_i$ is the trend coefficient of each function. The Gaussian assumption states that the vector formed by the true model responses, ${\ensuremath{\ve{y}}}$ and the prediction, $\widehat{Y}(\bfx)$, at a new point $\bfx$, has a joint Gaussian distribution defined by: $$\bra{ \begin{matrix} \widehat{Y}(\bfx) \\ {\ensuremath{\ve{y}}}\end{matrix} } \sim \mathcal{N}_{N+1} \prt{ \bra{ \begin{matrix} \bm{f}^\top(\bfx) \bm{\beta} \\ \mat{F} \bm{\beta} \end{matrix} } , \sigma^2 \bra{ \begin{matrix} 1 & \bm{r}^\top(\bfx) \\ \bm{r}(\bfx) & \mat{R} \end{matrix} } }$$ where $\bm{F}$ is the information matrix of generic terms: $$F_{ij} = f_j(\ve{x}^{(i)})~,~i=1 \enu N,~j=1 \enu P,$$ $\bm{r}(\bfx)$ is the vector of cross-correlations between the prediction point $\bfx$ and each one of the observations whose terms read: $$r_{i}(\bfx) = R(\bfx,\bfx^{(i)};\bm{\theta}), ~i=1 \enu N. \label{eq:r0}$$ $\bm{R}$ is the correlation matrix given by: $$R_{ij} = R(\bfx^{(i)},\bfx^{(j)};\bm{\theta}), ~i,j=1 \enu N.$$ The mean and variance of the Gaussian random variate $\widehat{Y}(\bfx)$ (a.k.a. mean and variance of the Kriging predictor) can be calculated based on the best linear unbiased predictor (BLUP) from @santner_design_2003: $$\label{eq:TheoryPredicorMean} \mu_{\widehat{Y}}(\ve{x}) =\ve{f}(\ve{x})^\top \ve{\beta} + \ve{r}(\ve{x})^\top \mat{R}^{-1}\left ({\ensuremath{\ve{y}}}-\mat{F}\ve{\beta} \right )\, ,$$ $$\label{eq:TheoryPredicorVariance} \sigma_{\widehat{Y}}^2(\ve{x}) = \sigma^2 \left( 1-\ve{r}^\top(\ve{x})\mat{R}^{-1}\ve{r}(\ve{x}) + \ve{u}^\top(\ve{x}) (\mat{F}^\top\mat{R}^{-1}\mat{F})^{-1}\ve{u}(\ve{x}) \right)$$ where: $$\label{eq:AKG:TheoryCalcBeta} \ve{\beta} = \left( \mat{F}^\top \mat{R}^{-1} \mat{F} \right)^{-1}\mat{F}^\top\mat{R}^{-1} {\ensuremath{\ve{y}}}$$ is the generalised least-squares estimate of the underlying regression problem and $$\label{eq:AKG:TheoryPredicorU} \ve{u}(\ve{x}) = \mat{F}^\top \mat{R}^{-1}\ve{r}(\ve{x}) - \ve{f}(\ve{x}).$$ The mean response in [Eq. (\[eq:TheoryPredicorMean\])]{} is considered as the output of a Kriging surrogate, $\widehat{\cm}(\bfx) = \mu_{\widehat{Y}}(\bfx)$. It is important to note that the Kriging model interpolates the data, : $$\label{eq:Kriging_interpolates} \mu_{\widehat{Y}}(\bfx) = \cm(\bfx), \quad \sigma_{\widehat{Y}}^2(\bfx) = 0, \quad \forall\, \bfx \in \cx$$ The equations that were derived for the best linear unbiased Kriging predictor assumed that the covariance function $\sigma^2 R(\cdot;\bfth)$ is known. In practice however, the family and other properties of the correlation function need to be selected *a priori*. The hyperparameters $\bm{\theta}$, the regression coefficients $\bm{\beta}$ and the variance $\sigma^2$ need to be estimated based on the available experimental design. The optimal estimates of the correlation parameters $\widehat{\bfth}$ are determined by minimising the generalisation error of the Kriging surrogate, based on the leave-one-out cross-validation error [@santner_design_2003; @Bachoc2013b]: $$\label{eq:Kriging_thetaCV} \ve{\theta}_{CV} = \underset{\cd_{\ve{\theta}}}{\arg \min} \sum_{i=1}^{K} \left( \cm(\ve{x}^{(i)}) - \mu_{\widehat{Y}, (-i)}(\ve{x}^{(i)}) \right) ^2 ,$$ where $\mu_{\widehat{Y}, (-i)}(\ve{x}^{(i)})$ corresponds to the mean value of a Kriging predictor that was built from the samples $\cx \,\backslash \acc{\bfx^{(i)}, y^{(i)}}$, evaluated at $\ve{x}^{(i)}$. The computational cost for calculating the terms $\mu_{\widehat{Y}, (-i)}(\ve{x}^{(i)})$ can be significantly reduced as shown in @Dubrule1983. First, the following matrix inversion is performed: $$\label{eq:Dubrule_B} \mat{B} = \bra{ \begin{matrix} \sigma^2 \mat{R} & \mat{F} \\ \mat{F}^\mathsf{T} & \mat{0} \end{matrix}}^{-1}.$$ Then $\mu_{\widehat{Y},(-i)}$ is calculated as follows: $$\label{eq:Dubrule_mean} \mu_{\widehat{Y},(-i)} = - \sum_{j=1,j\neq i}^N \frac{\mat{B}_{ij}}{\mat{B}_{ii}} \, y^{(j)}.$$ In this work we use cross-validation for estimating the correlation parameters instead of the maximum likelihood method [@santner_design_2003]). This is motivated by the comparative study in @Bachoc2013b between maximum likelihood (ML) and CV estimation methods. The CV method is expected to perform better in cases that the correlation family of the Kriging surrogate is not identical to the one of the true model. This is typically the case in practice and in the application examples in [Section \[sec:Applications\]]{}. Determining the optimal parameters $\ve{\theta}_{CV} $ in [Eq. (\[eq:Kriging\_thetaCV\])]{} leads to a complex multi-dimensional optimisation problem. Common optimisation algorithms employed to solve [Eq. (\[eq:Kriging\_thetaCV\])]{} can be cast into two categories: local and global. Local methods are usually gradient-based, such as the BFGS algorithm [@bazaraa2013bfgs], and search locally in the vicinity of the starting point. This makes them prone to get stuck at local minima, although they can be computationally efficient due to the use of gradients. Global methods such as genetic algorithms [@Goldberg1989] do not rely on local information such as the gradient. They seek the global minimum by various adaptive resampling strategies within a bounded domain. This often leads to considerably more objective function evaluations compared to local methods. As mentioned in [Section \[sec:Meth:DRSM:proxy\]]{}, to alleviate the computational costs in the inner loop optimisation in [Eq. (\[eq:DRSM\_inner\_loop\])]{}, an inexpensive-to-calibrate Kriging surrogate is built. To this end, the isotropic version of the Matérn correlation family is used, combined with low computational budget optimisation of the correlation parameters. For calculating the final, high-accuracy, Kriging surrogate an optimisation with high-computational budget is performed instead, combined with the use of an anisotropic correlation family. The introduction of anisotropy is expected to improve the generalisation performance the metamodel, as shown for instance in the study by @MoustaphaJRUES2018. ### Polynomial chaos expansions {#sec:Meth:SM:PCE} Polynomial chaos expansions represent a different class of surrogate models that has seen widespread use in the context of uncertainty quantification due to their flexibility and efficiency. Consider that $\ve{X} \in \Rr^M$ is a random vector with independent components described by the joint PDF $f_{\ve{X}}$ and that the model output ${Y}$ in [Eq. (\[eq:true\_model\])]{} has finite variance. Then the polynomial chaos expansion of $\cm(\ve{X})$ is given by: $$\label{eqn:PCE:PCE} Y = \cm(\Ve{X}) = \sum\limits_{\ua\in\mathbb{N}^M} \theta_{\ua} {\Psi}_{\ua}(\Ve{X})$$ where the $\Psi_{\ua} (\Ve{X})$ are multivariate polynomials orthonormal with respect to $f_{\Ve{X}}$, $\ua \in \mathbb{N}^M$ is a multi-index that identifies the components of the multivariate polynomials ${\Psi}_{\ua}$ and the $\theta_{\ua} \in \mathbb{R}$ are the corresponding coefficients. In practice, the series in [Eq. (\[eqn:PCE:PCE\])]{} is truncated to a finite sum, by introducing the truncated polynomial chaos expansion: $$\label{eq:PCE_truncatedPCE} \cm(\Ve{X}) \approx \widehat{\cm}(\Ve{X}) = \sum\limits_{\ua\in\ca} \theta_{\ua} {\Psi}_{\ua}(\Ve{X}) \equiv \bfth{}^\top \ve{\Psi}(\bfx)$$ where $\ca \subset \mathbb{N}^M$ is the set of selected multi-indices of multivariate polynomials. A typical truncation scheme consists in selecting multivariate polynomials up to a total degree $p$, $\ca = \acc{\ua \in \Nn^M \, : \, {\left\lVert\ua\right\rVert}_1 \leq p }$, with ${\left\lVert\ua\right\rVert}_1 = \sum_{i=1}^{M}\alpha_i$. The corresponding number of terms in the truncated series rapidly increases with $M$, giving rise to the “curse of dimensionality”. Other truncation strategies effective in higher dimension are discussed, , in @BlatmanPEM2010 [@Jakeman2015]. The polynomial basis $\Psi_{\ua}(\Ve{X})$ in [Eq. (\[eq:PCE\_truncatedPCE\])]{} is traditionally built starting from a set of *univariate orthonormal polynomials* $\phi^{(i)}_k(x_i)$ which satisfy: $$\label{eqn:PCE:Theory:UnivariateOrthonormalPoly} \left< \phi^{(i)}_j(x_i),\phi^{(i)}_k(x_i) \right> \eqdef \int_{\cd_{X_i}} \phi^{(i)}_j(x_i)\phi^{(i)}_k(x_i) f_{X_i}(x_i)\di x_i = \delta_{jk}$$ where $i$ identifies the input variable w.r.t. which they are orthogonal, as well as the corresponding polynomial family, $j$ and $k$ the corresponding polynomial degree, $f_{X_i}(x_i)$ is the $i^{th}$-input marginal distribution and $\delta_{jk}$ is the Kronecker symbol. Note that this definition of inner product can be interpreted as the expectation value of the product of the multiplicands. The multivariate polynomials $\Psi_{\ua}(\Ve{X})$ are then assembled as the tensor product of their univariate counterparts: $$\label{eqn:PCE: multivariate polynomials} \Psi_{\ua}(\ve{x}) \eqdef \prod_{i=1}^M \phi^{(i)}_{\alpha_i} (x_i)$$ For standard distributions, such as uniform, Gaussian, gamma, beta, the associated families of orthogonal polynomials are well-known [@Xiu2002]. Orthogonal polynomials can be constructed numerically w.r.t. any distribution (including non-parametric ones like those obtained by kernel density smoothing) by means of Gram-Schmidt orthonormalisation (a.k.a. Stieltjes procedure for polynomials [@Gautschi2004]). The expansion coefficients $\bfth = \acc{\theta_{\bm{\alpha}},\, \bm{\alpha} \in \ca \subset \Nn^M } $ in [Eq. (\[eq:PCE\_truncatedPCE\])]{} are calculated by minimising the expectation of least-squares residual [@Berveiller2006]: $$\label{eq:PCE_leastSquares_min} \widehat{\bfth} = \arg \min \Esp{ \left(\bfth\tr {\Psi}(\Ve{X}) - \cm(\Ve{X}) \right)^2}.$$ In the context of DRSM, the set of input parameters $\bfw$ for a PCE surrogate consists in $\bfw = \acc{p, \bm{\theta}}$, the maximal degree of the truncated expansion and the associated coefficients. Due to the quadratic programming nature of the minimisation in [Eq. (\[eq:PCE\_leastSquares\_min\])]{} and the linearity of PCE (see [Eq. (\[eq:PCE\_truncatedPCE\])]{}), we adopt the adaptive sparse-linear regression based on least angle regression first introduced by @BlatmanJCP2011. As for the case of Kriging, the LOO error (see [Eq. (\[eq:epsilon\_LOO\])]{}) is analytically available from the expansion coefficients [@BlatmanJCP2011]: $$\label{eq:PCE_LOO} \varepsilon_{LOO} = {\sum\limits_{i = 1}^N \left( \frac{\cm(\Ve{x}^{(i)}) - \widehat{\cm}^{PC}(\Ve{x}^{(i)})}{1-h_i}\right)^2}\bigg/{\sum\limits_{i = 1}^N \left(\cm(\ve{x}^{(i)}) - \widehat{\mu}_Y\right)^2},$$ where $h_i$ is the $i^{th}$ component of the vector given by: $$\label{eq:PCE_LOO_h} \Ve{h} = \text{diag}\left(\mat{A}(\mat{A}\tr\mat{A})^{-1} \mat{A}\tr\right),$$ and $\mat{A}$ is the experimental matrix with entries $A_{ij} = \Psi_j\prt{\bfx^{(i)})}$. To calculate the *proxy PCE* surrogates used during the DRSM optimisation phase (see [Section \[sec:Meth:DRSM:proxy\]]{}), the input variables in $\bfz$, are assumed uniformly distributed and independent. The PCE coefficients are computed by solving [Eq. (\[eq:PCE\_leastSquares\_min\])]{} using the ordinary least squares method [@Berveiller2006]. To calculate the PCE coefficients of the final, high-accuracy, surrogate $\widehat{\cm}(g(\bfx;\widehat{\bfw}))$, the distributions of the input variables are fitted using kernel-smoothing, while retaining the independence assumption, motivated by the results in @TorreJCP2018. In addition, a sparse solution is obtained by solving the optimisation problem in [Eq. (\[eq:PCE\_leastSquares\_min\])]{} using least angle regression [@BlatmanJCP2011] instead of ordinary least squares. Applications {#sec:Applications} ============ The performance of DRSM is evaluated on the following applications: (i) an artificial analytic function with $20$ unstructured inputs and approximately known intrinsic dimension, (ii) a realistic electrical engineering model with $80$ unstructured inputs and unknown intrinsic dimension and, (iii) a heat diffusion model with $16,000$ structured inputs and unknown intrinsic dimension. For each example, DRSM is applied using KPCA for compression together with Kriging or polynomial chaos expansions for surrogate modelling. The surrogate performance is then compared, in terms of generalisation error, to the sequential application of unsupervised dimensionality reduction followed by surrogate modelling. To improve readability, various details regarding the implementation of the optimisation algorithms and the surrogate models calibration are omitted from the main text and given in Appendix \[sec:Appendix:details\] instead. All the surrogate modelling techniques were deployed with the <span style="font-variant:small-caps;">Matlab</span>-based uncertainty quantification software <span style="font-variant:small-caps;">UQLab</span> [@Marelli2014; @UQLabPCE; @UQLabKriging]. Sobol’ function {#sec:App:sobol} --------------- The Sobol’ function (also known as $g$-function) is a commonly used benchmark function in the context of uncertainty quantification. It reads: $$\label{eq:app_Sobol} Y = \prod_{i=1}^{M} \frac{\abs{4X_i - 2} + c_i}{1 + c_i} \,,$$ where $\bfX = \lbrace X_1 \enu X_M \rbrace$ are independent random variables uniformly distributed in the interval $[0,1]$ and $ \bfc = \lbrace c_1 \enu c_M \rbrace^\mathsf{T}$ are non-negative constants. In this application, we chose $M = 20$ and the constants $\bfc$ given by @KonakliRESS2016 [@Kersaudy2015]: $$\label{eq:app_Sobol_constants} \bfc = \lbrace 1, 2, 5, 10, 20, 50, 100, 500, 500 \enu 500\rbrace^\mathsf{T}.$$ It is straightforward to see that the effect of each input variable $X_i$ to the output $Y$ is inversely proportional to the value of $c_i$. In other words, a small (resp. large) value of $c_i$ results in a high (resp. low) contribution of $X_i$ to the value of $Y_i$. For the given values of the constants $\bfc$, one would expect that, roughly, the first $4$ to $6$ variables can provide a compressed representation of $\bfX$ with minimal information loss regarding the input-output relationship. To showcase the performance of DRSM, an experimental design $\cx$, consisting of $800$ samples, is generated by Latin Hypercube sampling of the input distribution [@McKay1979]. Based on the samples in $\cx$ and the corresponding model responses $\bfy$, several combinations of KPCA, Kriging and PCE are tested within the DRSM framework. An additional set of $10^5$ validation samples $\acc{\cx_v, \bfy_v}$ is generated for evaluating the performance of the final surrogates. The first analysis consists in comparing the generalisation performance as a function of the compressed input dimension $m$ for Kriging and PCE models combined with KPCA with different kernels. Because of the availability of a validation set, the performance of the LOO error estimator in [Eq. (\[eq:epsilon\_LOO\])]{} is also assessed by comparing it with the true validation error in [Eq. (\[eq:epsilong\_gen\_ideal\])]{}. Figures \[fig:res\_sobol\_drsm\_m\_vs\_error-kg-loo\] and \[fig:res\_sobol\_drsm\_m\_vs\_error-pce-loo\] show the LOO error estimator of the final surrogate model when using Kriging and PCE, respectively. In each panel the different curves correspond to different KPCA kernels, namely polynomial kernel ([Eq. (\[eq:KPCA\_kernel\_poly\])]{}) and isotropic (resp. anisotropic) Gaussian ([Eq. (\[eq:KPCA\_kernel\_gauss\_aniso\])]{}). Figures \[fig:res\_sobol\_drsm\_m\_vs\_error-kg-rmse\] and \[fig:res\_sobol\_drsm\_m\_vs\_error-pce-rmse\] show the corresponding validation error on the validation set for the same scenarios. At a first glance, it is clear that the top and bottom figures are remarkably similar, both in their trends and in absolute value. Therefore, it is concluded that on this example $\epsilon_{LOO}$ is a good measure of the generalisation error $\epsilon_{gen}$. This is an important observation, because in the general case a validation set is not available, while $\epsilon_{LOO}$ can always be calculated. Moreover, the intrinsic dimension identified by all the best DR-SM combinations is equal to $\widehat{m} = 6$, which is a reasonable estimate based on the values of the constants $c_i$ in [Eq. (\[eq:app\_Sobol\_constants\])]{}. The DRSM algorithm identifies the anisotropic Gaussian kernel as the best KPCA kernel to be used in conjunction with both Kriging and PCE. However, the performance of PCE is significantly better in terms of generalisation error. The optimal parameters for each case (Kriging and PCE) are highlighted by a black dot in , and their numerical values are reported in . SM method KPCA kernel $\widehat{m}$ $\varepsilon_{LOO}$ $\widehat{\varepsilon}_{gen}$ ----------- ---------------------- --------------- --------------------- ------------------------------- Kriging Anisotropic Gaussian $6$ 0.0704 0.0830 PCE Anisotropic Gaussian $6$ 0.0096 0.0083 : Sobol’ function: optimal DRSM configurations for Kriging- and PCE-based surrogate models[]{data-label="tab:res_sobol_drsm_mstar"} Subsequently, the performance of DRSM is compared against an unsupervised approach, in which dimensionality reduction is carried out first, before applying surrogate modelling. To facilitate a meaningful comparison between the various methods, the reduced dimension and the optimal KPCA kernel as determined by the first analysis (see ) is used. The results are summarised in , while the corresponding list of tested configurations for both DRSM and the sequential DR-SM is given in . [.9]{}[l X r]{} **Dim. reduction** & **Parameter tuning objective** & **Abbreviation**\ Kernel PCA & $\varepsilon_{LOO}$ of Kriging (KG) or PCE surrogate ([Eq. (\[eq:DRSM\_outer\_loop\])]{}) & DRSM\ Kernel PCA & Reconstruction error ([Eq. (\[eq:KPCA\_Jrecon\])]{}) & KPCA-RECON\ Kernel PCA & Pairwise distance preservation ([Eq. (\[eq:KPCA\_Jdist\])]{})& KPCA-DIST\ PCA & - & PCA\ The experimental design consists of $800$ samples. The performance of each method is evaluated in terms of the generalisation error of the final surrogate $\widehat{\cm}(\bfz)$ evaluated on a validation set $\acc{\cx_v, \bfy_v=\cm(\cx_v)}$ with $10^5$ samples. To evaluate the robustness of the results, this process is repeated $10$ times, each corresponding to a different set $\cx$, drawn at random using the Latin Hypercube sampling method. On the left (resp. right) panel, a Kriging (resp. PCE) surrogate is calculated using one of the methods in . Each box plot in provides summary statistics of the generalisation error that was achieved by each configuration over the $10$ repetitions. The central mark indicates the median, and the bottom and top edges of the box indicate the $25^{\text{th}}$ and $75^{\text{th}}$ percentiles, respectively. The whiskers extend to the most extreme data points up to $1.5$ times the inter-quartile range above or below the box edges. Any sample beyond that range is considered an outlier and plotted as a single point. The DRSM approach consistently shows superior performance compared to the unsupervised approaches. This performance improvement becomes more apparent in the case of PCE surrogate modelling, where the average validation error over the $10$ repetitions is reduced by almost two orders of magnitude compared to the other methods. Due to the analytical nature of the model under consideration, we further evaluate the DRSM-based input compression by means of how the most important input variables are mapped to the reduced space. We adopt the total Sobol’ sensitivity indices as a rigorous measure of the importance of each input variable. Sobol’ sensitivity analysis is a form of global sensitivity analysis based on decomposing the variance of the model output into contributions that can be directly attributed to inputs or sets of inputs [@Sobol1993]. The total Sobol’ sensitivity index of an input variable $X_i$, denoted by $S_i^{Tot} \in [0,1]$, quantifies the total effect of $X_i$ on the variance of $Y$. In this particular example, the total Sobol’ indices can be analytically derived [@Saltelli2000]. Their values are shown for reference in . It is clear from [Eq. (\[eq:app\_Sobol\])]{} and [Eq. (\[eq:app\_Sobol\_constants\])]{} that all $20$ input variables contribute to the output variability, the intrinsic dimension of the problem is $20$. However, the contribution of each input component quickly diminishes with larger values of $c_i$ (see in which the values of the $20$ total Sobol’ indices are plotted, in logarithmic scale, as horizontal bars). Compressing the inputs in this problem is expected to lead to a mapping where those first few input components have the largest contribution. In the features in the reduced space $\bfZ$ are compared against the original inputs $\bfX$. The rationale behind this heuristic analysis is simple: if the features obtained by DRSM are correctly identified, they should depend mostly on the same variables identified as important in the Sobol’ analysis in . A simple measure of dependence between the reduced space components $\acc{z_i \, , \, i = 1 \enu m}$ and the initial input space components $\acc{x_i \, , \, i = 1 \enu M}$ is provided by the metric $\abs{\rho\prt{z_i,x_i}}$, where $\rho$ denotes the Spearman correlation coefficient. Figures \[fig:res\_sobol\_drsm\_features\_corr-1\] - \[fig:res\_sobol\_drsm\_features\_corr-4\] represent graphically the quantity $\abs{\rho\prt{z_i,x_i}}$ for the best surrogate identified in , namely a PCE coupled with KPCA using an anisotropic Gaussian kernel, evaluated on the validation set $\acc{\cx_v,\bfy_v}$. Each figure corresponds to a different selection of reduced space dimension $m$. clearly shows that (i) each $z_i$ correlates strongly with a specific $x_i$, (ii) the $z_i$’s correlate with the $m$ “most important” $x_i$’s, and, (iii) the larger $m$ value leads to the discovery of a new input $z_i$ that correlates with the next “most important” component of $\bfx$. Electrical resistor network {#sec:App:resistor_networks} --------------------------- ![The resistor networks application example[]{data-label="fig:app_resnets"}](images/app_resnets.pdf){width=".75\textwidth"} The electrical resistor network in [@Jakeman2015] is considered next. It contains $80$ resistances of uncertain ohmage (model inputs) and it is driven by a voltage source providing a known potential $V_0$. The output of interest is the voltage $V$ at the node shown in . A single set of $1,000$ experimental design samples and model responses is available, courtesy of J. Jakeman. As in the previous section, the goal of the first analysis is to determine the generalisation performance of the DRSM surrogate as a function of the reduced space dimension $m$ when KPCA is combined with either Kriging or PCE. In addition, the accuracy of the LOO error in [Eq. (\[eq:epsilon\_LOO\])]{} is compared to the validation error in [Eq. (\[eq:epsilong\_gen\_estim\])]{}. The samples are randomly split into $500$ pairs $\acc{\cx, \bfy}$ used during the DRSM calibration and $500$ pairs $\acc{\cx_v, \bfy_v}$ used for validation. Figures \[fig:res\_resnets\_drsm\_m\_vs\_rmse-kg-loo\] and \[fig:res\_resnets\_drsm\_m\_vs\_rmse-pce-loo\] show the LOO error estimator of the final surrogate model (Kriging or PCE), evaluated on $\acc{\cx,\bfy}$, whereas Figures \[fig:res\_resnets\_drsm\_m\_vs\_rmse-kg-rmse\] and \[fig:res\_resnets\_drsm\_m\_vs\_rmse-pce-rmse\] show the validation error of the surrogate, evaluated on $\acc{\cx_v,\bfy_v}$. In each panel, each curve corresponds to a different KPCA kernel, namely anisotropic or isotropic Gaussian, and polynomial. Finally, the optimal configuration for each SM method is illustrated by a black dot. Similarly to the Sobol’ function, the use of an anisotropic kernel in KPCA results in significantly reduced generalisation error. Indeed this is expected from a physical standpoint. The effect of the resistors on the voltage $V$ will decay with distance (in terms of the number of preceding resistors) from $V$, which implies anisotropy in terms of the effect of each input variable to the output. As in the previous application example, the LOO error in Figures \[fig:res\_resnets\_drsm\_m\_vs\_rmse-kg-loo\] and \[fig:res\_resnets\_drsm\_m\_vs\_rmse-pce-loo\] provides a reliable proxy of the generalisation error in Figures \[fig:res\_resnets\_drsm\_m\_vs\_rmse-kg-rmse\] and \[fig:res\_resnets\_drsm\_m\_vs\_rmse-pce-rmse\] and the same optimal parameters are identified w.r.t. the two error measures. The optimal DRSM configuration for each surrogate model is given in . SM method KPCA kernel $\widehat{m}$ $\varepsilon_{LOO}$ $\widehat{\varepsilon}_{gen}$ ----------- ---------------------- --------------- --------------------- ------------------------------- Kriging Anisotropic Gaussian $24$ 2.000e-04 2.402e-04 PCE Anisotropic Gaussian $32$ 3.621e-05 3.249e-05 : Resistor networks: optimal DRSM configurations for Kriging and PCE surrogate models[]{data-label="tab:res_resnets_drsm_mstar"} Next, the performance of DRSM is compared to unsupervised approaches considering the setups in . The results of this comparative study are given in using box plots. They are obtained by the repeated random selection of $500$ samples from the available $1,000$, leading to $10$ separate surrogate models for each case. The performance of each method is determined by means of the $\widehat{\varepsilon}_{gen}$ of the final surrogate $\widehat{\cm}(\bfz)$ evaluated on the validation set $\acc{\cx_v, \bfy_v=\cm(\cx_v)}$, that corresponds to the remaining $500$ samples of each split. Hence, each box-plot provides summary statistics of the validation error over the different splits. Each of the setups is tested both for Kriging () and PCE surrogates (). In this application example the DRSM-based surrogates outperform the others by several orders of magnitude in both cases (Kriging, PCE). This highlights the difference between the unsupervised and supervised compression: compressing the input using only the information in $\cx$ appears inefficient when followed by surrogate modelling. 2D heat diffusion {#sec:App:2d_diffusion} ----------------- This last application consists in a 2-dimensional stationary heat diffusion problem. The problem is defined in a square domain, $D=[-0.5,0.5]\times[-0.5,0.5]$, where the temperature field $T(\bfv),\, \bfv \in D$ is the solution of the elliptic partial differential equation: $$\label{eq:heat_pde} - \nabla \cdot \prt{d(\bfv) \nabla{} T(\bfv)} = 500 \, I_A(\bfv),$$ with boundary conditions $T=0$ on the top boundary and $\nabla T\cdot \bm{n}=0$ on the left, right and bottom boundaries, where $\bm{n}$ denotes the vector normal to the boundary. In [Eq. (\[eq:heat\_pde\])]{}, $A$ corresponds to a square domain (see ) and $I_A$ is the indicator function equal to 1 if $\bfv \in A$ and $0$ otherwise. The diffusion coefficient $d(\bfv)$ is a lognormal random field defined by: $$\label{eq:heat_diffcoeff} d(\bfv) = \exp \prt{a_d + b_d \,g(\bfv) },$$ where $g(\bfv)$ is a Gaussian random field and the parameters $a_d$, $b_d$ are such that the mean and standard deviation of $d$ are $\mu_d = 1$ and $\sigma_d = 0.3$ respectively. The random field is characterised by a Gaussian correlation function $R(\bfv,\bfv') = \exp \prt{- {\left\lVert\bfv - \bfv'\right\rVert}^2/\ell^2}$, with $\ell=0.2$. The output of interest is the average temperature in the square domain $B$ within $D$ (see ). To solve [Eq. (\[eq:heat\_pde\])]{}, the Gaussian random field $g(\bfv)$ is first discretised using the expansion optimal linear estimation (EOLE) method [@DerKiureghian1993]. Consider a grid in $D$ with nodes $\acc{\bm{v}_1 \enu \bm{v}_n}$. By retaining the first $p$ terms in the EOLE series, $g(\bfv)$ is approximated by: $$\label{eq:heat_EOLE} \widehat{g}(\bfv) = \sum_{i=1}^{p} \frac{\xi_i}{\sqrt{l^{(i)}}}\prt{\bm{\phi}^{(i)}}^\top\mat{C}_{\bfv\bm{v}}(\bfv),$$ where $\acc{\xi_1 \enu \xi_p}$ are independent standard normal random variables, $\mat{C}_{\bfv\bm{v}}$ is a vector with elements $C_{\bfv\bm{v}}^{(k)}=R(\bfv,\bm{v}_k)$ for $k=1 \enu n$ and $\{ \prt{l^{(i)}, \allowbreak \bm{\phi}^{(i)}}, \allowbreak \, i=1 \enu n\}$ are the eigenvalues and eigenvectors of the correlation matrix $\mat{C}_{\bm{v}\bm{v}}$ with elements $C_{\bm{v}\bm{v}}^{(i,j)} = R(\bm{v}_i,\bm{v}_j)$ for $i,j= 1 \enu n$. In the following analysis the Gaussian random field realisations are computed using $p=30$ terms in the EOLE series in [Eq. (\[eq:heat\_EOLE\])]{}, which allows to represent $93.69\%$ of the variance of the original field. The underlying deterministic problem is solved with an in-house finite-element analysis code developed in [<span style="font-variant:small-caps;">Matlab</span>]{}. The mesh shown in consists of $16,000$ triangular T3 elements. shows a realisation of the diffusion coefficient random field which corresponds to the input of the model. The corresponding model output, shown in , is the mean temperature in the highlighted square region $B$. Each realisation of the diffusion coefficient random field is discretised over the mesh in . In the following analysis, the system is treated as a black-box, with the discretised heat diffusion coefficient as a high-dimensional input ($M=16,000$) and the average temperature in square B as the scalar model output. A single set of $500$ experimental design samples and model responses is available. This example mimics a realistic scenario in which various maps of spatially varying parameters measured on a regular grid, are input to a computational model that analyses some performance of the system. ----------- ------------- --------------- ----------------- --------------------- ------------------------------- ---------- ---------- SM method KPCA kernel $\widehat{m}$ $\varepsilon_{LOO}$ $\widehat{\varepsilon}_{gen}$ $\widehat{w}_1$ $\widehat{w}_2$ $\widehat{w}_3$ Kriging Polynomial $20$ $131.3681$ $112.0040$ $1$ $0.0205$ $0.0216$ PCE Polynomial $20$ $17.5225$ $15.1853$ $1$ $0.0340$ $0.0356$ ----------- ------------- --------------- ----------------- --------------------- ------------------------------- ---------- ---------- : 2D diffusion: optimal DRSM configurations for Kriging- and PCE-based surrogate models[]{data-label="tbl:res_heat_drsm_mstar"} As in the previous application examples, the goal of the first analysis is to determine the optimal DRSM configuration in terms of the KPCA kernel and the reduced space dimension, as well as test the effectiveness of the LOO error as a proxy of the validation error. In this analysis, the available samples are randomly split into $300$ pairs to be used during the DRSM optimisation and $200$ pairs to be used for validation. The results are shown in . Figures \[fig:res\_diffusion2d\_m\_vs\_rmse-KG-LOO\] and \[fig:res\_diffusion2d\_m\_vs\_rmse-PCE-LOO\] show the LOO error estimator of the final Kriging (resp. PCE) surrogate, evaluated on $\acc{\cx, \bfy}$, whereas Figures \[fig:res\_diffusion2d\_m\_vs\_rmse-KG-RMSE\] and \[fig:res\_diffusion2d\_m\_vs\_rmse-PCE-RMSE\] show the validation error of the surrogate evaluated on $\acc{\cx_v, \bfy_v}$. Each curve corresponds to a specific type of KPCA kernel, namely isotropic Gaussian and polynomial, and a specific surrogate, namely Kriging and PCE. We omitted the anisotropic Gaussian kernel for KPCA which is intractable due to the large input dimensionality. A similar convergence behaviour is observed between Kriging- and PCE- based DRSM. The corresponding optimal parameter values are highlighted in and their numerical values are reported in . The linear polynomial kernel performs best in both cases and leads to the same reduced space dimension $\widehat{m}=20$. This significantly low dimension can be interpreted by [Eq. (\[eq:heat\_EOLE\])]{}. The heat diffusion coefficient, although $16,000$- dimensional, is a non-linear combination of $p$ independent standard normal random variables. Moreover, the LOO and validation error curves show similar behaviour both in terms of their trend and their absolute value. Hence, the LOO error served as a reliable proxy of the validation error, as was observed in the previous application examples too. In the subsequent analysis we compare the performance of the DRSM approach against other sequential approaches listed in . To test each setup, we repeat the calculation process $10$ times. In each case the $500$ available samples are split randomly into $300$ samples for calculating the surrogate and $200$ samples for validation. The optimal KPCA kernel that was determined by DRSM is used in all methods that involve KPCA. Also, for the sake of comparison, the same reduced space dimension $\widehat{m}=20$ is assumed for all methods. The results of this comparative study are given in using box plots to provide summary statistics of the validation error over the different splits of the samples. In case of Kriging surrogate modelling, DRSM consistently provides superior results compared to the other methods. Notice that KPCA with linear kernel is equivalent to PCA on a scaled version of the experimental design with scaling factor $\sqrt{w_1}$ (see Appendix \[sec:Appendix:PCA\_vs\_linKPCA\] for more details). The Kriging surrogates, in contrast to the PCE ones, are affected by this scaling. This also explains the performance improvement compared to the case of PCA-based DR. In case of PCE surrogate modelling, the performance improvement gained by DRSM is marginal compared to PCA and KPCA with distance preservation- based tuning of $\bfw$. Overall, DRSM consistently provides more accurate or at least comparable results compared to the other approaches. The main difference with a standard UQ setting in which the thermal conductivity is supposed to be sampled from a random field with known properties, is that the proposed DRSM methodology is purely data-driven, it would be applied identically in a case when the input maps are given without knowing the underlying random process. Summary and Conclusions ======================= Surrogate modelling is a key ingredient of modern uncertainty quantification. Due to the detrimental effects of high input dimensionality on most recent surrogate modelling techniques, the input space needs to be compressed to make such problems tractable. We proposed a novel approach for effectively combining dimensionality reduction with surrogate modelling, called DRSM. DRSM consists of three steps: (i) the DR and SM parameters are calculated by solving a nested optimisation problem, where only low-accuracy surrogates are considered to reduce the associated computational cost, (ii) the optimal configuration parameters, including the dimension of the reduced space, are empirically estimated based on the surrogate model performance, and, (iii) a final high-accuracy surrogate is calculated using the optimal values of all the aforementioned parameters. The performance of DRSM was compared on three different benchmark problems of varying complexity against the classical approach of tuning the dimensionality reduction and surrogate modelling parameters sequentially. DRSM consistently showed superior performance compared to the others in all the benchmark applications. The novelty of the proposed methodology lies in its non-intrusive way of combining dimensionality reduction and surrogate modelling. This allows for the combination of various techniques without the need of tweaking the dedicated optimisation algorithms on which each of them capitalises. A practical implication of the non-intrusiveness of DRSM is that off-the-shelf surrogate modelling methods (or even software) with sophisticated calibration algorithms can be directly used within this framework. The focus was given to data-driven scenarios where only a limited set of observations and model responses is available. We demonstrated that the leave-one-out cross-validation error of the surrogate models can serve as a reliable proxy for estimating the generalisation error in order to tune the DR parameters, but also to assess the overall accuracy of the resulting surrogate. It is noteworthy to mention that in application-driven scenarios where the goal is to obtain a surrogate with optimal performance (regardless of its type) for that specific problem, the proposed approach could be extended in a way that the surrogate type itself is included as one of the parameters that DRSM needs to optimise. However, special care would need to be given to the error metric used during the DRSM optimisation in this case, because the LOO error estimations by different surrogates may have widely varied levels of bias (see @Tibshirani2009). In future extensions of this work, focus will be given to capitalising on available HPC resources to optimise for different combinations of surrogate models and dimensionality reduction methods. In addition, the cost of training surrogate models increases with the number of available experimental design samples. Therefore, research efforts will also be directed towards dealing with large experimental designs, possibly within a *big data* framework. Acknowledgements {#acknowledgements .unnumbered} ================ Dr John Jakeman (Sandia National Laboratories) is gratefully acknowledged for having provided the data sets used in the electrical resistor networks application example ([Section \[sec:App:resistor\_networks\]]{}). Relationship between PCA and KPCA with linear kernel {#sec:Appendix:PCA_vs_linKPCA} ==================================================== Consider the PCA-based dimensionality reduction $\bfx \in \Rr^M \mapsto \bfz \in \Rr^m$. As discussed in [Section \[sec:Meth:DR:PCA\]]{}, $\bfz$ is calculated as follows: $$\label{eq:App_pca_z} \bfz = \bfx^\top \bm{V},$$ where $\bm{V} \in \Rr^{M\times m}$ is the collection of the $m$ eigenvectors of $\bm{C} = \text{cov}\bra{\cx}$ and $\cx \in \Rr^{N\times M}$ is the experimental design. Next, consider the kernel PCA mapping $\bfx \in \Rr^M \mapsto \bm{q} \in \Rr^m$ using the linear kernel function: $$\label{eq:app_linkernel} \kappa\prt{\bm{x},\bm{x}^\prime} = a\, \bm{x}^\top \bm{x}^\prime + b.$$ It is straightforward to show that the following transformation is equivalent to the linear kernel in [Eq. (\[eq:app\_linkernel\])]{}: $$\label{eq:app_linkernel_Phi} \Phi(\bfx) = \acc{\sqrt{b},\sqrt{a}\,x_1 \enu \sqrt{a}\,x_M}^\top,$$ because $\kappa\prt{\bm{x},\bm{x}^\prime} = \Phi(\bfx)^\top \Phi(\bfx^\prime)$. A sample $\bm{q}$ in the reduced space is calculated as follows (see [Section \[sec:Meth:DR:KPCA\]]{}): $$\label{eq:app_kpca_z} \bm{q} = \Phi(\bfx)^\mathsf{T} \bm{V}_\ch,$$ where $\bm{V}_\ch$ is the collection of the $m$ eigenvectors of $\bm{C}_{\ch} = \text{cov}\bra{\Phi(\cx)}$ with maximal eigenvalues. Notice that in case of $a=1$ and $b=0$, from Eqs. (\[eq:App\_pca\_z\]), (\[eq:app\_kpca\_z\]) follows that $\bfz = \bm{q}$. The covariance matrix $\bm{C}_{\ch}$ can be expressed as: $$\label{eq:app_Ch} \bm{C}_{\ch} = \begin{bmatrix} 0 & \ldots & 0 \\ \vdots & \multicolumn{2}{c}{\multirow{2}{*}{$a\, \bm{C}$}} \\ 0 \end{bmatrix}.$$ Hence, excluding the eigenvector that corresponds to the zero eigenvalue, it is straightforward to show that $$\label{eq:app_Vh} \bm{V}_{\ch} = \begin{bmatrix} 0 & \ldots & 0 \\ \multicolumn{3}{c}{\bm{V}} \\ \end{bmatrix}.$$ Based on Eqs. (\[eq:app\_linkernel\_Phi\]) and (\[eq:app\_Vh\]), [Eq. (\[eq:app\_kpca\_z\])]{} can be written as follows: $$\begin{aligned} {3} \bm{q} & = \begin{bmatrix}\sqrt{b} & \sqrt{a}\,\bfx^\top \end{bmatrix} \begin{bmatrix} 0 & \ldots & 0 \\ \multicolumn{3}{c}{\bm{V}} \\ \end{bmatrix}\\ & = \sqrt{a} \, \bfx^\top \bm{V} \\ & = \sqrt{a} \, \bfz \quad \text{(from {Eq.~(\ref{eq:App_pca_z})})} \end{aligned}$$ Therefore, the dimensionality reduction using kernel PCA with a linear kernel provides a scaled version of standard PCA and the constant $b$ has no effect. Implementation details {#sec:Appendix:details} ====================== This section provides an extensive list of the configuration parameter values that were used to produce the results in [Section \[sec:Applications\]]{}. (resp. )lists the configuration parameters of Kriging (resp. polynomial chaos expansions) surrogate models. For each surrogate method a distinction is made, in terms of the parameters used, between the proxy ( low computational cost) surrogate and the high-accuracy one. The proxy surrogates were used for solving the nested optimisation problem of DRSM in Eqs. (\[eq:DRSM\_outer\_loop\]), (\[eq:DRSM\_inner\_loop\]). The same configuration was used to calculate the high-accuracy surrogates regardless of the input compression method (DRSM or disjoint PCA/KPCA). [p[0.25]{}| p[0.21]{} p[0.21]{} p[0.21]{}]{} Application & Sobol’ function & Resistor networks & 2D diffusion\ \ Trend & constant ($P=0$)& linear ($P=1$)& linear ($P=1$)\ Correlation family&\ Estimation method&\ Optim. method &\ Optim. constraints &\ Population size (GA) &\ Max. iterations: &\ \ Correlation family&\ Population size (GA) &\ Max. iterations: &\ [p[0.25]{}| p[0.21]{} p[0.21]{} p[0.21]{}]{} Application & Sobol’ function & Resistor networks & 2D diffusion\ \ Coeff. calculation method &\ Univariate polynomials family&\ Hyperbolic truncation $q$ [@BlatmanPEM2010] & $0.75$& $0.50$& $0.65$\ Polynomial degree (adaptive search range) & $[1,10]$ & $[1,10]$ & $[1,5]$\ \ Coeff. calculation method &\ Univariate polynomials family&\ Hyperbolic truncation $q$ [@BlatmanPEM2010]&\ Polynomial degree (adaptive search range) &\ The parameters of the DRSM-based optimisation are listed in . Note that the exact same optimisation algorithm and parameters were used for optimising $\bfw$ w.r.t. the KPCA reconstruction and point-wise distance error in the box-plots used to compare the various approaches. The optimisation constraints differ from the ones reported in when a polynomial kernel is used in KPCA, as in [Eq. (\[eq:KPCA\_kernel\_poly\])]{}, for improved numerical stability of the solver. On top of the bound constraints reported in the table, that still apply for $w_1$ and $w_2$, the variable $w_3$ (degree) is constrained to integer values $1\leq w_3 \leq 4$ instead. In addition, the following non-linear constraint is included: $$w_1 \bfx^\mathsf{T}\bfx' + w_2 > 1.$$ Application Sobol’ function Resistor networks 2D diffusion ---------------------- ------------------------------------------------------- -------------------------------------------------------- ---------------------------------------------------- Optim. method Optim. constraints Population size(GA): $20$ for isotropic KPCA kernels, $80$ for anisotropic $20$ for isotropic KPCA kernels, $100$ for anisotropic $20$ (only isotropic KPCA kernels were considered) Max. iterations: $80$ for both GA and BFGS $150$ for both GA and BFGS $80$ for both GA and BFGS
{ "pile_set_name": "ArXiv" }